<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Initiating interdisciplinary research for future-proof data protection in the context of Data Spaces and semantic interoperable data sharing</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author role="corresp">
							<persName><forename type="first">Michiel</forename><surname>Fierens</surname></persName>
							<email>michiel.fierens@kuleuven.be</email>
							<affiliation key="aff0">
								<orgName type="department">Centre for IT</orgName>
								<orgName type="institution">Law KU Leuven</orgName>
								<address>
									<addrLine>Sint-Michielsstraat 6</addrLine>
									<postCode>3000</postCode>
									<settlement>Leuven</settlement>
									<country key="BE">Belgium</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Initiating interdisciplinary research for future-proof data protection in the context of Data Spaces and semantic interoperable data sharing</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">F191212B724D1699E103F281E8C9DA48</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T18:28+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Data sharing</term>
					<term>data protection</term>
					<term>semantic interoperability</term>
					<term>GDPR</term>
					<term>Data Spaces</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>The objective of this article is to propose a way forward for addressing the challenges currently facing data protection law in the context of a widespread implementation of Data Spaces and semantic interoperable data sharing. The failure to implement data protection law in an appropriate manner within this context could impede the implementation of Data Spaces and hinder the necessary protection of fundamental rights, as data protection can be considered a gateway right.</p><p>[1] This is because the General Data Protection Regulation (GDPR) is based on assumptions and characteristics of data sharing that do not match the possibilities of Data Spaces and a broader evolution of semantic, interoperable data sharing. Although the call for future-proofing data protection has been heard for some time, it becomes even more relevant and tangible in a context of semantically interoperable data sharing. In this context, this article identifies the underlying assumptions and characteristics of data sharing on which current data protection law is based, contrasting these with the characteristics of semantic interoperable data sharing within Data Spaces. Subsequently, it identifies a series of key areas for further research, delineating common threads that can serve as a foundation for interdisciplinary discussions and research on future-proof data protection approaches in the context of Data Spaces and semantic interoperable data sharing. Moreover, based on these common threads, more specific preliminary suggestions for future-proofing data protection in the context of Data Spaces and semantic interoperable data sharing are also explored. In this way, the article contributes to the EU's objectives for the development of Data Spaces and benefits a wide range of stakeholders, including legislators, policymakers, enforcement authorities, providers and users of (personal) data spaces, and academics.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>The European Union has identified the necessity to improve the accessibility of data and knowledge within its European single market. This is based on the view that this will contribute to economic growth, competitiveness, and innovation. Ideally, innovation and competition no longer take place at the level of data collection or data availability, but at the level of service provision. <ref type="bibr" target="#b1">[2]</ref> The aspiration to achieve this has constituted a significant driving force behind broader technical developments in the management and exploitation of interrelated data for a range of potential applications. For example, this can be observed with regard to the evolution of database systems in diverse data landscapes. <ref type="bibr" target="#b2">[3]</ref> In consequence, the EU is now seeking to establish environments or spaces where data from governments, businesses, and citizens can be securely shared and utilised in a way that fully exploits the potential interrelatedness between data. <ref type="bibr" target="#b3">[4]</ref> Semantic interoperability is a pivotal factor in the establishment of these environments, designated as 'Common European Data Spaces'. By establishing a shared understanding of data definitions, structures, and relationships, data can be consistently interpreted across diverse organisational contexts. <ref type="bibr" target="#b4">[5]</ref> The ability of computer systems to comprehend the meaning of data, and to establish or read connections between data, is facilitated by semantics. The overarching objective is to develop a system that is capable of semi-automatically identifying, establishing, enhancing and maintaining relationships between data and data sources within a specific context. <ref type="bibr" target="#b5">[6]</ref> Accordingly, the concept of Common European Data Spaces encompasses a variety of elements and functionalities, designed to facilitate the discovery, integration and analysis of data originating from heterogenous sources. This, in turn, is intended to enhance data quality, accuracy and decision-making across a range of organisational contexts. <ref type="bibr" target="#b6">[7]</ref> The objective is to move away from the prevailing approach to data sharing, which is based on the transmission of data in a specific syntactically interoperable format and requires a significant amount of data collection. This has resulted in the necessity for data to be sorted, labeled, and contextualized by each organization individually after it has been shared, in order to facilitate the extraction of meaning and value from the data.</p><p>The European Union (EU) is striving to enhance the accessibility of data and knowledge by exploiting the inherent interrelatedness of data in spaces where data from governments, businesses, and citizens can be securely shared and utilised. At the same time, it has enacted regulations to safeguard the fundamental right to data protection of individuals. These regulations have an indirect impact on the technology used to enhance data and knowledge accessibility, which may, in turn, constrain its potential. In this context, and given the current broad definition of personal data that triggers the applicability of the GDPR, this article focuses on the GDPR and personal data, rather than other legislation relating to purely non-personal data. <ref type="bibr" target="#b7">[8]</ref> The advent of a more expansive evolution concerning data sharing provides an ideal opportunity to initiate interdisciplinary discourse on the existing challenges of data protection and to reflect on how these challenges can be further adapted in light of this novel and as-yet-unfolding evolution. This approach allows the EU's objective of achieving semantic interoperable data sharing and Data Spaces to be reconciled with the fundamental principles of data protection.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Semantic interoperable data sharing within Data Spaces remains underexplored by legal scholars</head><p>Although no universally accepted definition of a Data Space currently exists, it can be most closely described as an environment, defined by a governance framework and underlying technical infrastructure, which adheres to specific design principles set out by a given overarching organisation. The aim of such a "space" is to facilitate secure and reliable data transactions between organisations which are participating in that space. <ref type="bibr" target="#b8">[9]</ref> The delineation of precise boundaries of the operation of a Data Space represents a challenging proposition, given the inherent ambiguity of the concept of a Data Space itself.</p><p>To illustrate, a variety of Data Spaces may exist as standalone Data Spaces or as components of a more comprehensive Data Spaces. In this regard, any definition is necessarily broad, as it must encompass the potential for data sharing in a variety of environments. Moreover, the further development of functionalities and semantic interoperable data sharing in these environments will occur in an incremental manner, evolving in accordance with time and the specific requirements of the context. <ref type="bibr" target="#b9">[10]</ref> Over time, more comprehensive functionalities and methods for the facilitation of the discovery, integration and analysis of data across a diverse range of storage locations and data types will be developed in such environments. These functionalities will enable the seamless further sharing and utilisation of data through the exploitation of the interrelatedness between data and the extraction of knowledge from it upon sharing. Nevertheless, the concept of semantic interoperability, which is pivotal to a new approach to data sharing, as well as the development of these innovative data sharing environments in which this form of interoperability is used, has not been sufficiently addressed by legal scholars. Although interoperability has been studied in consumer and competition law, no distinction has been made between a syntactic (where computer systems do not understand relationships between data) and semantic context of data sharing. The objective of these studies was mainly to examine the potential for interoperability to achieve the objectives of both branches of law. <ref type="bibr" target="#b10">[11,</ref><ref type="bibr" target="#b11">12,</ref><ref type="bibr" target="#b12">13]</ref> Therefore, it failed to consider the potential to facilitate the discoverability and usability of data across organizational boundaries, as well as to enhance the exploitation of relationships between data through the use of for example data models. In the context of data protection law, research has predominantly adopted a relatively limited approach to data sharing. This approach has typically involved allowing organisations to determine the appropriate structure for sharing data for further copying, sorting, labelling and contextualising within their own environment. The concept of interoperability was primarily regarded as a mere instrument for operationalising the right to data portability and facilitating data transfers between different data silos. In this context, the authors considered closed, static environments in which personal data is shared using only a standardised data format. Nevertheless, as will be discussed in the following sections, the potential for providing functionalities in a diverse landscape in terms of data sources and structures used through open, dynamic environments and the use of semantic interoperability was not yet a consideration. <ref type="bibr" target="#b13">[14,</ref><ref type="bibr" target="#b14">15,</ref><ref type="bibr" target="#b15">16]</ref> Furthermore, the current shortcomings in data protection were not taken into account in the context of these prospective developments. Lastly, there is even research on federated learning <ref type="bibr" target="#b16">[17,</ref><ref type="bibr" target="#b17">18,</ref><ref type="bibr" target="#b18">19]</ref> and decentralised data processing <ref type="bibr" target="#b19">[20,</ref><ref type="bibr" target="#b20">21]</ref>. In the context of providing functionalities and consequently processing data across distributed repositories of data, this can be a useful approach. Instead of being trained on a central server, machine-learning models are trained on local or decentralised storage places, like a party's device. This can be partially compared to the use of Data Spaces and semantic interoperable data sharing, whereby functionalities are combined to exploit the interrelatedness between data and thus extract knowledge from it in an environment with various distributed or decentralised storage locations. It is important to note, however, that semantic interoperability, namely the exploitation of relationships between data by enabling computer systems to better understand the meaning of data through for example data models, can also serve as a key enabler of machine learning. The advancement of semantic data models, which provide structure in diverse data landscapes, has the potential to enhance the predictive power of machine learning methods. <ref type="bibr" target="#b21">[22]</ref> Moreover, the ongoing development of this technology and its implications for data protection have yet to be fully identified or acknowledged. <ref type="bibr" target="#b22">[23,</ref><ref type="bibr" target="#b23">24]</ref> </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Research objectives and methodology used</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1.">Research objective</head><p>The objective of this article is to provide an initial introduction to the broader evolution in data sharing for legal scholars who are not already familiar with it, as well as to offer insights into the potential developments that may further occur in this field. In particular, the article aims to examine the potential of utilising semantic interoperable data sharing in combination with the proposed Data Spaces by the European Union, and its implications for data protection legislation. It is recognised that, in pursuit of this aim, certain elements pertaining to semantic interoperable data sharing and Data Spaces may be simplified to a degree that is not in exact alignment with the technical specifications. However, a balance is always sought between the use of technical and legal terms. Once the characteristics of the future evolution in data sharing are exposed, the current shortcomings in data protection can identified as well. In this way, the identified shortcomings can immediately be considered in the context of the broader future evolution of data sharing. This should prompt an interdisciplinary debate and research initiatives aimed at developing future-proof data protection strategies. The following sections in the article demonstrate how the use of semantic data models and the implementation of several functionalities in Data Spaces shift the emphasis from data collection to the provision of new data-intensive services and render identified and existing data protection issues even more pertinent and tangible, while also introducing novel specific challenges.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2.">Broader evolution in data sharing and consequences for data protection</head><p>The EU has made the creation of Data Spaces and the use of semantic data interoperability as its fundamental building block a major policy choice to facilitate (personal) data sharing in the European Single Market. The fundamental importance of semantic data interoperability for facilitating a new way of sharing data already emerged clearly in the public sector through the establishment of the European interoperability framework <ref type="bibr" target="#b24">[25]</ref>, and the proposal for an Interoperable Europe Act. <ref type="bibr" target="#b25">[26]</ref> The objective of Data Spaces, as well as that of semantic interoperability, is to improve the services offered by organizations. Rather than having to deal with large and diverse amounts of potentially useful and interrelated data, which may be unevenly structured and thus difficult to search and make use of, such an environment should be equipped with the capacity to facilitate a spectrum of data analysis services and provide core functionalities that are indispensable for the effective retrieval and use of valuable data. To achieve semantic interoperable data sharing in Data Spaces, data are mapped into semantic data models. Simply put, data and their interrelationships, as well as further information about that data are thereby mapped into such a semantic data model so that a computer system can read and understand it.</p><p>However, there is considerable diversity of opinion among organisations as to the optimal approach to establishing Data Spaces and implementing semantic interoperability in such an environment. In particular, the methods employed to exploit relationships between data and, consequently, represent knowledge (data models, vocabularies, etc.) upon sharing vary depending on the context and the aim of the Data Spaces. It is crucial to highlight the incremental nature of the broader evolution in data sharing, where a balance must be struck between uniformity and the accommodation of disparate organisational requirements and varying data infrastructures. Consequently, the extent to which relationships between data can be exploited and knowledge can be represented and extracted from datasets, thus facilitating semantic interoperable data sharing, may be more limited in practice. <ref type="bibr" target="#b26">[27,</ref><ref type="bibr" target="#b27">28]</ref> The non-standardised use of data models and vocabularies also poses challenges. <ref type="bibr" target="#b28">[29]</ref> More specifically on the technical side of semantic interoperability, there are still challenges in terms of knowledge extraction or the derivation of insights <ref type="bibr" target="#b29">[30]</ref> as well as flexible and advanced querying <ref type="bibr" target="#b30">[31]</ref> of semantic interoperable and thus interconnected data.</p><p>The above considerations must be borne in mind throughout the article. Given the inherent difficulty in achieving a balance between uniformity and the accommodation of disparate organisational requirements and varying data infrastructures, this article does not seek to provide an exhaustive overview of potential ways to set up Data Spaces. Furthermore, it does not analyse all the implications of data sharing through Data Spaces on different legal frameworks. This article, rather than focusing on a specific aspect of data sharing, aims to provide an overview of the broader evolution of data sharing that is being driven by the use of Data Spaces and semantic interoperability. These two concepts, in combination, establish various basic functionalities that facilitate new ways of processing data across a diverse landscape of different storage locations and data structures. The widespread use of semantic data models and the dynamic and collective characteristics of Data Spaces deviate from the assumptions underlying the current data protection framework, as will be demonstrated in the following sections. In that regard, the article begins by providing a brief overview of the assumptions that underpin the GDPR, before translating these into concrete problems concerning the application of the GDPR in new technological contexts. This illustrates how the broader evolution of data sharing makes current problems even more relevant and tangible. In this way, the article aims to make a concrete call for interdisciplinary debate, while also identifying potential avenues for further research.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3.">Research design and methodology</head><p>The objective of this article is to establish a foundation or a way forward for future research into futureproof data protection in the context of Data Spaces and semantic interoperable data sharing. It could be argued that data protection represents a gateway right to the respect of other fundamental rights of data subjects. <ref type="bibr" target="#b0">[1]</ref> It is therefore of the utmost importance that, in light of the extensive realisation of Data Spaces and semantic interoperability, current data protection issues are not reinforced or even intensified, as this could have a significant impact on the fundamental rights of data subjects.</p><p>Firstly, the primary characteristics of semantic interoperable data sharing within Data Spaces will be identified and explained in order to facilitate a comprehensive understanding of the broader evolution regarding data sharing. This article then builds on the aforementioned characteristics and subsequently demonstrates the shortcomings of the underlying assumptions and characteristics of data sharing as set forth in the GDPR in that context. In light of these characteristics and shortcomings, the article proceeds to propose several key research areas that should form the basis of any future research on new data protection approaches. These key research areas can be seen as common threads, which serve to provide a framework for further interdisciplinary research into Data Spaces and semantic interoperable data sharing. Moreover, these common threads are situated within the context of existing research on future-proof data protection approaches. Consequently, future research can build upon them while also distinguishing itself from existing research in light of the specific characteristics of Data Spaces and semantic interoperability, as outlined in Section 4 below. In conclusion, the paper also considers potential preliminary suggestions regarding the adaptation of the prevailing underlying assumptions of the GDPR, based on the aforementioned common threads.</p><p>It is recommended that new technological developments incorporate data protection from the outset in their design. Nevertheless, pursuing such a design has become an exceptionally challenging endeavour. The abstract nature of such a fundamental right, as well as the normative regulatory framework that protects it, presents a significant obstacle in applying these interpretations in specific contexts. Given the pioneering nature of semantic interoperability and Data Spaces, the Designing-by-Debate (DbD) method is deployed as the principal methodology for delineating the characteristics of this new evolution, as well as its implications on the underlying assumptions and characteristics of data sharing as enshrined in the GDPR. <ref type="bibr" target="#b31">[32]</ref> The value of this approach lies in its capacity to integrate the perspectives of stakeholders from a range of areas of expertise. Software engineers may, for instance, adopt a narrow perspective on certain concepts, such as data protection. In contrast, lawyers possess a more comprehensive understanding of these concepts, coupled with an awareness of the potential implications of new technological developments on other fundamental rights. In accordance with a DbD approach, a broader societal perspective is intrinsic to the design of any given research project. Consequently, this approach enables the research questions to be solved by integrating the perspectives of stakeholders from different areas of expertise. In this context, and for the purposes of writing this article, SolidLab Flanders, which provides financial support to the author of this article, represents an exemplary case in which a DbD approach is being employed to investigate broader societal challenges. The consortium is comprised of stakeholders from a range of disciplines, including computer science, law, economics, and communication sciences. Collectively, they are engaged in exploring the potential of personal data spaces and their application in the data economy in Flanders. This exploration is conducted in collaboration with policymakers, citizens, and entrepreneurs in a quadruple helix framework. Participatory exercises facilitate the mapping of views and practices among relevant stakeholders from different areas of expertise. In this way, consequences that were not foreseen for individuals, industry and society alike are brought to light, and the normative issues that they raise are identified.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Characteristics of semantic interoperable data sharing</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1.">Functionalities distributed over heterogenous, scattered storage locations</head><p>Similar to the early days of the Internet and the absence of search engines to look up websites more specifically, the European single market used to be nothing more than a collection of separately accessible databases or data storage locations. As computer systems become capable of understanding the relationships between data, through the use of semantic interoperable data sharing and the use of semantic models, opportunities have arisen to facilitate a spectrum of data analysis services and provide core functionalities such as browsing, querying and cataloguing data that are indispensable for the effective retrieval and use of valuable data in environments where data is unevenly structured and thus difficult to search. The growing use of semantic data models and the creation of interconnected infrastructure (named middleware or connectors) through the use of equipment and design principles provided by organisations establishing principles and specific (modular) software for Data Spaces such as IDSA, Gaia-X and FIWARE enables organisations to semi-automatically identify, establish, enhance and maintain relationships between data and data sources within a specific context. In this respect, it can be considered to be comparable to the establishment of an integrated database that is accessible, searchable and comprised of the data from a number of different existing databases. <ref type="bibr" target="#b32">[33]</ref> In the past, achieving this result necessitated the consultation of each database individually, followed by the additional processes of structuring, labelling and contextualising the data retrieved from that database. Parties immediately obtain knowledge and value by searching through a mixture of different types of storage locations. <ref type="bibr" target="#b33">[34]</ref> The location of the data storage is of lesser importance, as a large, searchable network comprises a number of disparate storage locations, interconnected by Data Spaces and the deployment of semantic data models to facilitate computer systems' ability to exploit the interrelationships between data. <ref type="bibr" target="#b34">[35]</ref> While this broader evolution in data sharing also offers opportunities to implement sovereignty mechanisms over data storage locations through Data Spaces and semantic interoperability, the potential risks lie in the fact that connecting elements and functionalities are provided on top of this diverse and complex data landscape. This facilitates novel approaches to data processing, as well as more sophisticated forms of processing, given that semantic data models permit computer systems to interpret relationships between data upon sharing. The precise impact of those connecting elements and functionalities such as for example brokering services, cataloguing data sets and common services, as well as providing specific semantic data models or vocabularies for mapping data, remains underexplored.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2.">Leveraged interrelatedness of data</head><p>From a social perspective, certain data is inherently relational, frequently pertaining to friends and family. It can thus be argued that the processing of data from one individual entails the processing of data from other individuals, who may be considered data subjects in their own right. <ref type="bibr" target="#b35">[36]</ref> In this context, it is interesting to note that Data Spaces and the use of semantic interoperability facilitate the expression and subsequent processing of relationships between data. In light of the fact that different types of data with varying structures from a multitude of data providers within a Data Space can be retrieved in a manner that facilitates ease of association with other data available in the Data Space, the distinction between personal and non-personal data, as well as that between the so-called special categories of data, such as sensitive data, becomes increasingly difficult to maintain. <ref type="bibr" target="#b36">[37]</ref> It is relatively straightforward to classify data sets that contain both personal and non-personal data as being 'inextricably' <ref type="bibr" target="#b37">[38]</ref> linked to each other <ref type="bibr" target="#b38">[39]</ref>. The advent of Big Data and novel data analysis techniques within closed silo environments has already rendered the existence of these categories questionable. However, the more widespread use of Data Spaces and semantic interoperability, where a spectrum of data analysis services and functionalities in environments with dynamic and collective characteristics enable the further use and further exploitation of potentially interrelated data for every potential Data Space participant, makes these categories no longer tenable at all.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.3.">Dynamic and collective data sharing environments</head><p>In a big data or data silo context, the collection and subsequent extraction of knowledge always involved copying, sorting, labelling and contextualising the (received) data. This has always been done within closed environments managed by a limited number of parties. <ref type="bibr" target="#b39">[40]</ref> However, the European Union aspires to eliminate multiple copies of data and new closed environments. To achieve this, the EU advocates the 'once only' principle in data spaces with semantic interoperable data sharing. When data is made available in that Data Space to a particular organisation, it should be retrieved from its original storage location(s) and re-used without making copies when possible. <ref type="bibr" target="#b40">[41]</ref> In this regard, the advancement of various sovereignty and trust mechanisms, such as the capacity to encapsulate semantic interoperable data in a Data Space with policies for its subsequent use, is intended to address concerns pertaining for example to intellectual property, which are associated with this reuse. However, these concerns will not be further elaborated upon in this discussion. <ref type="bibr" target="#b41">[42]</ref> Data Spaces making use of semantic interoperable data sharing are inherently dynamic. After all, semantic data models, vocabularies, data catalogues and data analysis services are constantly being refined by multiple parties involved in a Data Space. <ref type="bibr" target="#b42">[43]</ref> For example, according to a specific context or need, certain data sets can be made available in the central catalogue of the Data Space, after which the parties themselves can select a semantic data model in which to map that data set, rework it and make it available again in the Data Space. Indeed, these parties can also further refine the semantic data model and the exploitation of the interrelatedness of the data in their specific context. This approach permits the establishment of even more comprehensive relationships between data, thereby facilitating the enhancement of knowledge extraction. Data Spaces are consequently seen a dynamic and collective effort.</p><p>The collective and dynamic aspects can be clearly highlighted by contrasting the visual representation of the data life cycle in a semantic interoperable data sharing ecosystem with that of the classical data life cycle. The classical cycle is depicted as a straight line, representing a closed environment with limited parties involved. It starts with the creation of data and ends with its destruction, and then a new cycle begins. In contrast, the data life cycle used in Data Spaces with semantic interoperable data sharing is continuous and has no end. In this cycle, each party can contribute at any point, and the inputs from different parties build on one another (Figure <ref type="figure">4</ref>.3). <ref type="bibr" target="#b43">[44]</ref> The collective in a semantic interoperable environment such as a Data Space, as it were, manages the data and its life cycle. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Underlying assumptions and characteristics of data sharing under the GDPR</head><p>The General Data Protection Regulation (GDPR) <ref type="bibr" target="#b44">[45]</ref> is based on the fundamental right to the protection of personal data as stated in Article 8 of the EU Charter of Fundamental Rights. The GDPR permits the sharing and processing of data, provided that certain principles are observed. In addition, individuals (data subjects) are afforded the right to exercise forms of control over their data, for instance, by exercising their data subject rights. <ref type="bibr" target="#b45">[46]</ref> The GDPR remains a crucial tool to maintain a balance between sharing personal data and protecting individuals' data in the context of new technological developments in information collection and data sharing. Nevertheless, in light of the characteristics of Data Spaces and semantic interoperable data sharing outlined in the preceding section, it becomes evident that the underlying assumptions and characteristics of data sharing under the GDPR are not without shortcomings.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.1.">Taking into account closed and static environments for data sharing</head><p>The GDPR is regarded as a forward-thinking and technology-neutral framework that addresses emerging technological advancements in data collection and sharing (recital 15 GDPR). Nevertheless, at the time of the drafting of the GDPR, the EU was particularly aware of the data silo structures employed by Big Tech companies, which were attempting to limit data sharing with other companies in various ways. <ref type="bibr" target="#b46">[47]</ref> The initial step toward enabling data sharing across closed systems owned by different parties was the development of a common, machine-readable format so that data can be more easily transferred from one company to another. <ref type="bibr" target="#b47">[48]</ref> When considering the right to data portability in the GDPR, initial proposals indicated a potential for the use of standards regarding semantic data models. However, the EU ultimately opted for a less ambitious formulation and requirement of standards regarding interoperability, which resulted in a focus on formal aspects of data sharing and thus on organising data according to pre-determined instructions. <ref type="bibr" target="#b48">[49]</ref> The right to data portability shows that the EU focused mainly on enabling data subjects to receive their personal data in a machine-readable, structured and commonly used format. Data subjects could then take their data in this format to another company, where it had to be labelled, contextualised to be able to extract knowledge from it and further use it in a meaningful way.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.2.">Focus on data as input of the data processing operations</head><p>The GDPR currently starts from the idea that the nature of data is the focal point for the application of data protection legislation. So not every processing of any kind of data can be covered by the GDPR, only data relating to identified or identifiable people. <ref type="bibr" target="#b49">[50]</ref> In addition, processing certain types of data, sensitive data such as health data, also requires taking additional safeguards. The European legislator's decision to focus on controlling objectively defined categories of data, such as personal and sensitive data, can also be explained by the origins of data protection law in information theory. Information theory is based on the use of mathematical principles to ensure the effective transfer of data between communication systems and is consistent with a specific focus on the sharing of data between closed and static environments. <ref type="bibr" target="#b50">[51]</ref> In this context, the data itself, or in other words the input to the data sharing process, is essential. Data analysis services and functionalities across a diverse landscape of data storage locations are not considered. However, given the potential of Data Spaces and semantic interoperability to exploit the interrelatedness of data, as outlined in Section 4.2, it is challenging to develop a comprehensive theory that distinguishes between the legal status of different categories of data.</p><p>[52]</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.3.">Underlying principle of separation of data processing operations</head><p>The purpose limitation principle represents the central nexus of data processing throughout the GDPR. It emphasises the importance of specifying the purpose of data processing as an initial balancing exercise before any data processing takes place. In order to mitigate the risks associated with the processing of personal data, it is essential that personal data is only processed within the context and framework of the specified purpose. Moreover, it ensures that data processing is transparent and predictable for the data subjects concerned. Data controllers (the party determining the purposes and means of processing following the GDPR) may not link data collected for different purposes to one broad purpose and process them only, for example, because their use might be advantageous in the future. A comprehensive interpretation of the GDPR, which implies reading it in a holistic way, for example by considering all other principles and obligations in the context of purpose limitation, shows that it should in principle be prohibited to integrate different data (sets) that were originally processed for other purposes. In particular, the principles of storage limitation, data minimisation (Article 5 GDPR) and the obligation of data protection by design and default (Article 25 GDPR) require that collected data are stored or at least only accessible separately according to their different purposes. In this context, Felix Bieker identifies an underlying objective of separating processing operations, thereby also separating the storage and subsequent utilisation of data. <ref type="bibr" target="#b45">[46]</ref> This can be reframed in the original context of closed, static environments, where data was separately labelled and contextualised for further use, and the emphasis was on the concept of data itself as input. The dynamic and collective manner in which data is shared and subsequently used, integrated or refined in Data Spaces through an array of data analysis services and functionalities and thus processing operations, initially appears to be at odds with the principle of separation.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.4.">Emphasis on the individual's ability to manage personal data</head><p>Another aspect that can be read into the GDPR is the emphasis put on respecting autonomy and human dignity of data subjects while processing personal data. <ref type="bibr" target="#b52">[53]</ref> It can be argued that data protection is primarily concerned with a self-determination approach, whereby the individual's ability to exercise a form of control over their personal data processing is of paramount importance. <ref type="bibr" target="#b53">[54]</ref> The initial focus is on the individual and their capacity to comprehend the specific circumstances surrounding the processing of their personal data. <ref type="bibr" target="#b54">[55]</ref> For example, the legitimacy of processing (specific) categories of personal data under the lawful processing ground of consent or explicit consent hinges on the individual's own responsibility to accept this as a lawful processing ground for the data controller.</p><p>Further, the concept of data protection rights is founded upon the fundamental values of autonomy and human dignity; thus, they are primarily associated with the data subject's capacity to play a role in the process of data protection. The right to data portability and the right to access, which serve as a nexus for all other data subject rights, build on the idea that individuals (data subjects) can exercise a form of control over their data and are able to manage their own data. <ref type="bibr" target="#b55">[56]</ref> In doing so, data subjects should be able to receive their personal data in a machine-readable, structured and commonly used format in order to share data freely between service providers (and consequently data controllers). <ref type="bibr" target="#b56">[57]</ref> Nevertheless, the individual's ability or responsibility can be questioned, given that it is not uncommon for an information asymmetry and power imbalance to persist between a controller and an individual as a data subject in such a context. <ref type="bibr" target="#b57">[58]</ref> Moreover, historically, data protection has never focused solely on protecting individuals. Over time, this has become the dominant narrative. <ref type="bibr" target="#b58">[59]</ref> A predominant focus on the data subject's ability to make his or her own data protection decisions, and thus on the individual, does not take into account the broader history of data protection law and the role that the collective plays in it. <ref type="bibr" target="#b59">[60]</ref> In light of the collective and dynamic environments that Data Spaces and semantic interoperability entail, it is challenging to justify the proposition that the principles set forth in the GDPR should be primarily examined from the perspective of the individual.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">Towards future-proof data protection approaches</head><p>This section identifies key research areas that can provide a foundation for further interdisciplinary research into Data Spaces and semantic interoperable data sharing. These key research areas are based on existing research on data protection approaches in new technological contexts. In this respect, they can serve as a foundation upon which future research can build, while also distinguishing itself from existing research. The relevance and tangible nature of these key research areas is further enhanced by the advent of semantically interoperable data sharing and Data Spaces. Indeed, these key research areas can be regarded as common threads which should be taken into consideration with regard to research aimed at establishing a balance between the underlying assumptions and characteristics of data sharing in accordance with the GDPR and those of Data Spaces and semantic interoperable data sharing. In this context, the article also explores preliminary suggestions regarding potential adaptations to the GDPR in light of the specific characteristics of semantic interoperability as set out in Section 4.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.1.">Division of responsibilities</head><p>The advent of Data Spaces and semantic interoperable data sharing is giving rise to the emergence of new data sharing ecosystems, with new types of services and responsible parties and even a potential whole collective responsibility for a Data Space itself. In addition, the growing modularity and, consequently, interoperability of software components facilitate this process and diversity. With each incremental development, an additional layer of complexity has been introduced over time. The fact that the knowledge extraction and a broader semantic evolution in data sharing occurs in dynamic environments, with collective efforts being built upon, serves to increase the complexity of the situation. This is particularly relevant in light of the current extensive and vague jurisprudence concerning personal data and the concept of data controllership. The broad interpretation of joint-controllership under the GDPR in the current case law, as well as the many grey areas surrounding this concept of controllership, impede the predictability of the precise responsibilities and, in turn, complicate the effective implementation of the GDPR. Almost anyone can qualify as a controller in that respect, so to speak. <ref type="bibr" target="#b60">[61]</ref> Similar problems have already been extensively described in the literature, for example in relation to cloud computing and accountability in distributed or decentralized environments (e.g. with scattered storage locations). There, too, complex technical infrastructure chains ensure that multiple parties play a role in the data processing. <ref type="bibr" target="#b61">[62]</ref> A conclusive solution regarding the application of the GDPR in such complex chains with different parties, however, has not yet been found. It follows that the expansion of joint control gives rise to the necessity for active collaboration. Nevertheless, no court, nor the Article 29 Working Party or EDPB, offers guidance on potential default scenarios of coordination or further specifications of what should occur in the absence of such coordination. <ref type="bibr" target="#b62">[63]</ref> This leaves room for the designation of so-called accidental controllers. Those with actual influence over the purposes and means of processing may derive benefit from such ambiguities and may seek to transfer their obligations to other actors. <ref type="bibr" target="#b63">[64]</ref> Such a situation may even give rise to a paradoxical effect, resulting in a lack of accountability. In that regard, the subsequent proposal of a step-based approach to reduce the complexity of the division of responsibilities had the unintended consequence of introducing an additional layer of complexity. <ref type="bibr" target="#b62">[63]</ref> In consideration of the step-based approach, there appears to be a shift in focus towards a microscopic view of the processing operations. Nevertheless, there is a notable absence of guidance regarding the extent to which the division of responsibilities of the parties in question could be balanced in such a situation. Furthermore, there is no examination of the broader implications and thus an additional macroscopic view. In addition, it is noteworthy that no data protection authority makes reference to the possibility of differentiating between the various forms of enforcement that could be applied to parties jointly responsible. <ref type="bibr" target="#b64">[65]</ref> In this regard, existing literature proposes, for instance, the narrowing of the controllership scope and the imposition of a higher threshold for the level of influence over processing means. <ref type="bibr" target="#b63">[64]</ref> It is noteworthy that the technical implementation of semantic interoperability can facilitate the determination of and subsequent narrow delineation of controllership and even its subsequent translation in practice. <ref type="bibr" target="#b65">[66]</ref> To illustrate, in a semantic interoperable data sharing environment, such as a Data Space, data or knowledge flows can be formalised in semantic data models in a manner that facilitates the development of logging mechanisms to ensure transparency and data provenance during the processing of data. This allows for the determination of controllership. <ref type="bibr" target="#b66">[67]</ref> In order to achieve this objective, efforts have already been made to translate the obligations set out in the GDPR into machine-readable computer language. This allows the legislation to be linked to the use of data in such environments, thus facilitating its implementation. <ref type="bibr" target="#b67">[68]</ref> In that regard, the Open Digital Rights Language (ODRL) allows data and metadata to be modelled in such a way that compliance of certain parties with the GDPR can then be automatically verified. <ref type="bibr" target="#b68">[69]</ref> </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.2.">Collective interests</head><p>The collective and dynamic context that Data Spaces and semantic interoperable data sharing create suggest a greater focus on collective interests. In this context, the organisation of Data Spaces will be contingent upon the specific context and the particular organisational requirements of the specific use cases in question. This will entail the achievement of a collective purpose through the use of semantic interoperable data sharing within the Data Space. Referring to fundamental European values, one should in that regard look beyond individual autonomy to the outward-looking dimension and the relationship of one's choices to those of other individuals and collective interests. <ref type="bibr" target="#b69">[70]</ref> In a similar vein, existing principles and rights of the GDPR could be interpreted in a more collective way for the purpose of data sharing through Data Spaces. <ref type="bibr" target="#b70">[71]</ref> The GDPR's right to portability, for example, allows the interests of others to be taken into account when exercising that right. Similarly, the principles of data minimisation and accuracy can both be interpreted simultaneously at the individual and collective levels. For example, at the individual level something may be accurate, but at the collective level, with respect to multiple data subjects, more data may still be needed to provide an accurate representation with respect to the collective. Even the interpretation of a purpose can be expanded more collectively to encompass the entire Data Space, as long as adequate safeguards are in place. This would mean that specific processing operations can only occur within the overarching purpose defined at the Data Space level. However, without additional changes regarding the division of responsibilities, this approach may also provide a means for controllers to avoid their responsibility, as they can always refer to the fact that the Data Space (operator) itself determines the purposes of processing and thus retains control over the processing. Furthermore, at this time, the potential trade-offs between the GDPR's principles and rights <ref type="bibr" target="#b71">[72]</ref>, as well as between an individual or collective interpretation <ref type="bibr" target="#b72">[73]</ref>, are not explicitly or clearly delineated in guidelines. Further research is also required in order to gain a greater understanding of the matter in question.</p><p>Lastly, the collective, as it were, manages the data and its life cycle and consequently the interconnectedness of (personal) data. The collective and long-term impact of semantic interoperable data sharing should therefore be considered. The new Data Governance Act <ref type="bibr" target="#b73">[74]</ref>, relies on data intermediaries <ref type="bibr" target="#b74">[75]</ref> such as data cooperatives and data altruism organisation to collectively manage data and the interests of multiple data subjects. <ref type="bibr" target="#b75">[76]</ref> One possible avenue to pursue is to permit individuals or data intermediaries to define access conditions for the use of personal data through the technical possibilities inherent in semantic interoperability. <ref type="bibr" target="#b76">[77]</ref> However, overly paternalistic treatment of the collective may also overly harm individual autonomy. Future research should therefore thoroughly examine in which cases (in which contexts) individual interests still matter and outweigh possible collective interests. <ref type="bibr" target="#b52">[53]</ref> </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.3.">Broader data-related harms</head><p>Authors have also pointed towards protection against so-called information-related harms that concern both the collective and the individual. <ref type="bibr" target="#b77">[78]</ref> These kind of harms arise specifically in situations where a party is able to exploit the interrelatedness of data sets through the use of semantic models and subsequently extracts knowledge from acquired data or information which does not necessarily qualify as personal data (e.g. because it aggregates large quantities of data) and, as a result, falls outside the scope of the GDPR. In that regard, the complete implications of Data Spaces and semantic interoperable data sharing, particularly in regard to information-induced harms, remain uncertain.</p><p>Current tools provided in the GDPR such as Data Protection Impact Assessment or Data Protection by Design have the potential to tackle these harms. In practice, however, they do not adequately address these. <ref type="bibr" target="#b78">[79]</ref> Lawmakers hoped to address as many unwanted side effects of digitisation as possible with the GDPR. <ref type="bibr" target="#b79">[80]</ref> In practice, on the other hand, policymakers are not always eager to legislate abstract and sometimes difficult to foresee collective or information-related harms, for example due to a lack of precise falsifiability. <ref type="bibr" target="#b80">[81]</ref> Consequently, the GDPR affords data controllers greater freedom to make assessments regarding potential information-related harms and places responsibility on data subjects to object. A shift in focus from the regulation of information or data (input of the process) to the regulation of knowledge (output of the process), for instance through the consideration of broader social impact assessments or ex ante risk-based government prohibitions of data use, is a compelling argument when discussing future-proof data protection approaches in Data Spaces. <ref type="bibr" target="#b50">[51]</ref> Once more, data intermediaries may be instrumental in protecting such broader societal interests and in facilitating broader societal impact assessments for further data use. A review of recent legislative initiatives, such as the AI Act <ref type="bibr" target="#b81">[82]</ref> and the Digital Services Act <ref type="bibr" target="#b82">[83]</ref>, also indicates the potential for risk-based government prohibitions to mitigate broader risks and harms in society in advance. Similarly, future research could investigate the potential for extending the application of certain data protection principles to encompass computer code more broadly. The advancement of semantic models and vocabularies in accordance with these principles may serve as a means of mitigating potential information-induced harms. <ref type="bibr" target="#b83">[84]</ref> </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="7.">Conclusion</head><p>The GDPR's existing assumptions and characteristics of data sharing ignore how data sharing is evolving in relation to the wider use of Data Spaces and semantic interoperability. The use of semantic interoperable data sharing has enabled the provision of diverse data analysis services across heterogeneous environments where data was previously characterised by inconsistency in structure. Furthermore, it allows organisations to promptly exploit the interrelatedness between data and data sources within a specific context upon sharing, thus facilitating immediate knowledge and value extraction. With the EU now fully committed to creating European Data Spaces and the use of semantic interoperability, the consequent creation of consortia and bringing together stakeholders provides the perfect opportunity to develop future-proof data protection approaches. Therefore, this article provides a foundation for future interdisciplinary research into such approaches. It outlines common threads that should be followed in such research. These threads build on existing research on concerns related to the application of the GDPR in new technological contexts. However, the common threads become even more relevant and tangible with the creation of Data Spaces and the associated use of semantic interoperable data sharing.</p><p>In addition, this article also explores preliminary suggestions for future-proof data protection approaches in light of the specific characteristics of semantic interoperability. Firstly, the advent of complex data-driven supply chains necessitates the development of a more nuanced understanding of the interrelationships between the different actors involved. In the event of multiple parties being held responsible under the GDPR, it is essential that a set of guiding principles is in place to ensure a fair and comprehensive division of responsibilities. This must take into account a macroscopic view of the processing chain. Once the responsibilities in question have been legally delineated or reinterpreted, technical semantic interoperability capabilities can facilitate the translation of such a delineation or reinterpretation in practice via logging mechanisms and automatic verification of compliance with several data protection obligations. Second, the European Data Protection Supervisor could propose more collective interpretations of the principles and rights in the GDPR, and data protection authorities could also enforce them in a more collective way. In this respect, a new balance between individual and collective interests needs to be found. Data intermediaries in the new Data Governance Act provide an interesting ground for further research in this regard. Once more, the technical possibilities inherent in semantic interoperability could enable data intermediaries to embed access conditions in the data they manage for data subjects, thus facilitating the automatic and balanced conditioning of further use of that data. Thirdly, the consideration of broader societal harms and the shift in focus from the regulation of data to the regulation of knowledge processing and the associated increase in information-related harms are important aspects for further discussion. In this context, future research could investigate the necessity of certain limitations on specific forms of knowledge extraction or data reuse. Furthermore, the potential benefits of broader societal impact assessments when processing data should be further examined. The utilisation of semantic data models and vocabularies could also be subjected to certain fundamental data protection principles and consequently design requirements.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Data Lifecycle 'evolution' as advance by BDVA.</figDesc><graphic coords="7,72.00,253.71,451.29,239.85" type="bitmap" /></figure>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Acknowledgments</head><p>Michiel Fierens is supported by SolidLab Vlaanderen (Flemish Government, EWI and RRF project VV023/10).</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Refining the Concept of the Right to Data Protection in Article 8 ECFR -Part II: Controlling Risks through (Not To) Article 8 ECFR against the Other Fundamental Rights</title>
		<author>
			<persName><forename type="first">M</forename><surname>Von Grafenstein</surname></persName>
		</author>
		<idno type="DOI">10.2139/ssrn.3840116</idno>
	</analytic>
	<monogr>
		<title level="j">European Data Protection Law Review</title>
		<imprint>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="page" from="195" to="197" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<ptr target="https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A52020DC0066" />
		<title level="m">Communication from the Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions -A European strategy for data</title>
				<imprint>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">From databases to dataspaces: a new abstraction for information management</title>
		<author>
			<persName><forename type="first">M</forename><surname>Franklin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Halevy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Maier</surname></persName>
		</author>
		<idno type="DOI">10.1145/1107499.1107502</idno>
	</analytic>
	<monogr>
		<title level="j">ACM SIGMOD Record</title>
		<imprint>
			<biblScope unit="volume">34</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="27" to="33" />
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<monogr>
		<ptr target="https://eur-lex.europa.eu/legal-content/en/ALL/?uri=CELEX:52018DC0232" />
		<title level="m">Communication from the Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions -Towards a common European data space</title>
				<imprint>
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Demystifying the Role of Data Interoperability in the Access and Sharing Debate</title>
		<author>
			<persName><forename type="first">J</forename><surname>Hoffmann</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">Gonzalez</forename><surname>Otero</surname></persName>
		</author>
		<idno type="DOI">10.2139/ssrn.3705217</idno>
	</analytic>
	<monogr>
		<title level="j">JIPITEC</title>
		<imprint>
			<biblScope unit="volume">11</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="252" to="273" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Principles of dataspace systems</title>
		<author>
			<persName><forename type="first">A</forename><surname>Halevy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Franklin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Maier</surname></persName>
		</author>
		<idno type="DOI">10.1145/1142351.1142352</idno>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the twentyfifth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems</title>
				<meeting>the twentyfifth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems<address><addrLine>New York, NY, USA</addrLine></address></meeting>
		<imprint>
			<publisher>Association for Computing Machinery</publisher>
			<date type="published" when="2006">2006</date>
			<biblScope unit="page" from="1" to="9" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">The Evolution of Data Spaces</title>
		<author>
			<persName><forename type="first">B</forename><surname>Otto</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-030-93975-5_1</idno>
	</analytic>
	<monogr>
		<title level="m">Designing Data Spaces : The Ecosystem Approach to Competitive Advantage</title>
				<editor>
			<persName><forename type="first">B</forename><surname>Otto</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Hompel</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">S</forename><surname>Wrobel</surname></persName>
		</editor>
		<meeting><address><addrLine>Cham</addrLine></address></meeting>
		<imprint>
			<publisher>Springer International Publishing</publisher>
			<date type="published" when="2022">2022</date>
			<biblScope unit="page" from="3" to="15" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Personal Data and Encryption in the European General Data Protection Regulation</title>
		<author>
			<persName><forename type="first">G</forename><surname>Spindler</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Schmechel</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">JIPITEC -Journal of Intellectual Property, Information Technology and E-Commerce Law</title>
		<imprint>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="page" from="163" to="177" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<monogr>
		<ptr target="https://ec.europa.eu/newsroom/dae/redirection/document/83562" />
		<title level="m">Commission staff working document on Common European Data Spaces</title>
				<imprint>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<monogr>
		<title level="m" type="main">Semantic Interoperability in data spaces</title>
		<author>
			<persName><forename type="first">S</forename><surname>Steinbuss</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Turkmayali</surname></persName>
		</author>
		<idno type="DOI">10.5281/ZENODO.10964377</idno>
		<imprint>
			<date type="published" when="2024">2024</date>
			<publisher>International Data Spaces Association</publisher>
		</imprint>
	</monogr>
	<note type="report_type">Technical Report</note>
</biblStruct>

<biblStruct xml:id="b10">
	<monogr>
		<author>
			<persName><forename type="first">M</forename><surname>Bourreau</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Kraemer</surname></persName>
		</author>
		<idno type="DOI">10.2139/ssrn.4181838</idno>
		<title level="m">Interoperability in Digital Markets</title>
				<imprint>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">The Refusal to Allow Interoperability Between Android Auto and Third-Party Apps -A Deep Dive into Enel X Italia v</title>
		<author>
			<persName><forename type="first">C</forename><surname>Koolen</surname></persName>
		</author>
		<idno type="DOI">10.1007/s40319-022-01190-x</idno>
	</analytic>
	<monogr>
		<title level="j">Google, IIC -International Review of Intellectual Property and Competition Law</title>
		<imprint>
			<biblScope unit="volume">53</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="758" to="777" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Mandating portability and interoperability in online social networks: Regulatory and competition law issues in the European Union</title>
		<author>
			<persName><forename type="first">I</forename><surname>Graef</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.telpol.2015.04.001</idno>
	</analytic>
	<monogr>
		<title level="j">Telecommunications Policy</title>
		<imprint>
			<biblScope unit="volume">39</biblScope>
			<biblScope unit="issue">6</biblScope>
			<biblScope unit="page" from="502" to="514" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">How to Make Data Portability Right More Meaningful for Data Subjects?</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">C</forename><surname>Cravo</surname></persName>
		</author>
		<idno type="DOI">10.21552/edpl/2022/1/9</idno>
	</analytic>
	<monogr>
		<title level="j">European Data Protection Law Review</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="page" from="52" to="60" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Personal Data Portability In The Platform Economy: Economic Implications And Policy Recommendations</title>
		<author>
			<persName><forename type="first">J</forename><surname>Krämer</surname></persName>
		</author>
		<idno type="DOI">10.1093/joclec/nhaa030</idno>
	</analytic>
	<monogr>
		<title level="j">Journal of Competition Law &amp; Economics</title>
		<imprint>
			<biblScope unit="volume">17</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="263" to="308" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Aligning data protection rights with competition law remedies? The GDPR right to data portability</title>
		<author>
			<persName><forename type="first">O</forename><surname>Lynskey</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">European Law Review</title>
		<imprint>
			<biblScope unit="volume">42</biblScope>
			<biblScope unit="issue">6</biblScope>
			<biblScope unit="page" from="793" to="814" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Federated Learning: Challenges, Methods, and Future Directions</title>
		<author>
			<persName><forename type="first">T</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">K</forename><surname>Sahu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Talwalkar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Smith</surname></persName>
		</author>
		<idno type="DOI">10.1109/MSP.2020.2975749</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Signal Processing Magazine</title>
		<imprint>
			<biblScope unit="volume">37</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="50" to="60" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Privacy preservation in federated learning: An insightful survey from the GDPR perspective</title>
		<author>
			<persName><forename type="first">N</forename><surname>Truong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Sun</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Guitton</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Guo</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.cose.2021.102402</idno>
	</analytic>
	<monogr>
		<title level="j">Computers &amp; Security</title>
		<imprint>
			<biblScope unit="volume">110</biblScope>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Advances and Open Problems in Federated Learning</title>
		<author>
			<persName><forename type="first">P</forename><surname>Kairouz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">B</forename><surname>Mcmahan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Avent</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Bellet</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Bennis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">N</forename><surname>Bhagoji</surname></persName>
		</author>
		<idno type="DOI">10.1561/2200000083</idno>
	</analytic>
	<monogr>
		<title level="j">Foundations and Trends in Machine Learning</title>
		<imprint>
			<biblScope unit="volume">14</biblScope>
			<biblScope unit="page" from="1" to="210" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Decentralized data processing: personal data stores and the GDPR</title>
		<author>
			<persName><forename type="first">H</forename><surname>Janssen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Cobbe</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Norval</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Singh</surname></persName>
		</author>
		<idno type="DOI">10.1093/idpl/ipaa016</idno>
	</analytic>
	<monogr>
		<title level="j">International Data Privacy Law</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="356" to="384" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Exploring the limits of joint control: the case of COVID-19 digital proximity tracing solutions</title>
		<author>
			<persName><forename type="first">S</forename><surname>Rossello</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Dewitte</surname></persName>
		</author>
		<ptr target="https://nbn-resolving.deurn:nbn:de:0009-29-53370" />
	</analytic>
	<monogr>
		<title level="j">JIPITEC</title>
		<imprint>
			<biblScope unit="volume">12</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="342" to="369" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<monogr>
		<author>
			<persName><forename type="first">A</forename><surname>Kurteva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">J</forename><surname>Pandit</surname></persName>
		</author>
		<title level="m">Relevant Research Questions For Decentralised (Personal) Data Governance, in: Trusting Decentralised Knowledge Graphs and Web Data (TrusDeKW) Workshop</title>
				<meeting><address><addrLine>ESWC</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2023">2023. 2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<monogr>
		<title level="m" type="main">Knowledge Graph in ML</title>
		<author>
			<persName><forename type="first">K</forename><surname>Yaser</surname></persName>
		</author>
		<ptr target="https://www.techtarget.com/searchenterpriseai/definition/knowledge-graph-in-ML" />
		<imprint>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<monogr>
		<author>
			<persName><forename type="first">J</forename><surname>Cassiman</surname></persName>
		</author>
		<ptr target="https://blog.ml6.eu/how-are-knowledge-graphs-and-machine-learning-related-ff6f5c1760b5" />
		<title level="m">How are knowledge graphs and machine learning related</title>
				<imprint>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<monogr>
		<ptr target="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:52017DC0134&amp;from=FI" />
		<title level="m">Communication from the Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions. European Interoperability Framework -Implementation Strategy</title>
				<imprint>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<monogr>
		<ptr target="https://data.europa.eu/eli/reg/2024/903/oj" />
		<title level="m">Regulation (EU) 2024/903 of the European Parliament and of the Council of 13 Mar 2024 laying down measures for a high level of public sector interoperability across the Union (Interoperable Europe Act)</title>
				<imprint>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<monogr>
		<ptr target="https://digital-strategy.ec.europa.eu/en/library/second-staff-working-document-data-spaces" />
		<title level="m">Commission Staff Working Document on Common European Data Spaces</title>
				<imprint>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<monogr>
		<ptr target="https://dssc.eu/space/BVE/357073006/Data+Spaces+Blueprint+v1.0" />
		<title level="m">Data Spaces Support Centre, Data Spaces Blueprint v1.0. Conceptual Model of Data Spaces</title>
				<imprint>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b28">
	<analytic>
		<title level="a" type="main">Overcoming Linguistic Barriers to the Multilingual Semantic Web</title>
		<author>
			<persName><forename type="first">G</forename><surname>Hirst</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-662-43585-4_1</idno>
	</analytic>
	<monogr>
		<title level="m">Towards the Multilingual Semantic Web: Principles, Methods and Applications</title>
				<editor>
			<persName><forename type="first">P</forename><surname>Buitelaar</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">P</forename><surname>Cimiano</surname></persName>
		</editor>
		<meeting><address><addrLine>Berlin, Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2014">2014</date>
			<biblScope unit="page" from="3" to="14" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b29">
	<analytic>
		<title level="a" type="main">A Graph DB-Based Solution for Semantic Technologies in the Future Internet</title>
		<author>
			<persName><forename type="first">S</forename><surname>Ferilli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Bernasconi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Di Pierro</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Redavid</surname></persName>
		</author>
		<idno type="DOI">10.3390/fi15100345</idno>
	</analytic>
	<monogr>
		<title level="j">Future Internet</title>
		<imprint>
			<biblScope unit="volume">15</biblScope>
			<biblScope unit="issue">10</biblScope>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b30">
	<analytic>
		<title level="a" type="main">A knowledge graph-based data harmonization framework for secondary data reuse</title>
		<author>
			<persName><forename type="first">F</forename><surname>Abad-Navarro</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Martínez-Costa</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.cmpb.2023.107918</idno>
	</analytic>
	<monogr>
		<title level="j">Computer Methods and Programs in Biomedicine</title>
		<imprint>
			<biblScope unit="volume">243</biblScope>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b31">
	<analytic>
		<title level="a" type="main">Designing-by-Debate: A Blueprint for Responsible Data-Driven Research &amp; Innovation</title>
		<author>
			<persName><forename type="first">J</forename><surname>Ausloos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Heyman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Bertels</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Pierson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Valcke</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-319-73207-7_8</idno>
	</analytic>
	<monogr>
		<title level="m">Responsible Research and Innovation Actions in Science Education, Gender and Ethics: Cases and Experiences</title>
				<editor>
			<persName><forename type="first">F</forename><surname>Ferri</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">N</forename><surname>Dwyer</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">S</forename><surname>Raicevich</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">P</forename><surname>Grifoni</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">H</forename><surname>Altiok</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">H</forename><forename type="middle">T</forename><surname>Andersen</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Y</forename><surname>Laouris</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">C</forename><surname>Silvestri</surname></persName>
		</editor>
		<meeting><address><addrLine>Cham</addrLine></address></meeting>
		<imprint>
			<publisher>Springer International Publishing</publisher>
			<date type="published" when="2018">2018</date>
			<biblScope unit="page" from="47" to="63" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b32">
	<monogr>
		<title level="m" type="main">One Step Closer to Intertwingularity: Semantic Metadata</title>
		<author>
			<persName><forename type="first">T</forename><surname>Petkova</surname></persName>
		</author>
		<ptr target="https://www.ontotext.com/blog/semantic-metadata/" />
		<imprint>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b33">
	<monogr>
		<title level="m" type="main">Linked Data is Like a Bag of Chips</title>
		<author>
			<persName><forename type="first">T</forename><surname>Berners-Lee</surname></persName>
		</author>
		<ptr target="https://www.w3.org/DesignIssues/BagOfChips.html" />
		<imprint>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b34">
	<analytic>
		<title level="a" type="main">Standardisation, Data Interoperability, and GDPR</title>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">J</forename><surname>Pandit</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Debruyne</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>O'sullivan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Lewis</surname></persName>
		</author>
		<idno type="DOI">10.4018/978-1-7998-2181-6.ch008</idno>
	</analytic>
	<monogr>
		<title level="m">Shaping the Future Through Standardization</title>
				<imprint>
			<publisher>IGI Global Scientific Publishing</publisher>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page" from="199" to="225" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b35">
	<analytic>
		<title level="a" type="main">Human Data Interaction: Historical Lessons from Social Studies and CSCW</title>
		<author>
			<persName><forename type="first">A</forename><surname>Crabtree</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Mortier</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-319-20499-4_1</idno>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 14th European Conference on Computer Supported Cooperative Work</title>
				<editor>
			<persName><forename type="first">N</forename><surname>Boulus-Rødje</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">G</forename><surname>Ellingsen</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">T</forename><surname>Bratteteig</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Aanestad</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">P</forename><surname>Bjørn</surname></persName>
		</editor>
		<meeting>the 14th European Conference on Computer Supported Cooperative Work<address><addrLine>Oslo, Norway; Cham</addrLine></address></meeting>
		<imprint>
			<publisher>Springer International Publishing</publisher>
			<date type="published" when="2015-09-23">19-23 September 2015. 2015</date>
			<biblScope unit="page" from="3" to="21" />
		</imprint>
	</monogr>
	<note>ECSCW 2015</note>
</biblStruct>

<biblStruct xml:id="b36">
	<analytic>
		<title level="a" type="main">Data Is What Data Does: Regulating Based on Harm and Risk Instead of Sensitive Data</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">J</forename><surname>Solove</surname></persName>
		</author>
		<idno type="DOI">10.2139/ssrn.4322198</idno>
	</analytic>
	<monogr>
		<title level="j">Northwest Univ Law Rev</title>
		<imprint>
			<biblScope unit="volume">118</biblScope>
			<biblScope unit="page" from="1099" to="1111" />
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b37">
	<monogr>
		<ptr target="https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A52019DC0250" />
		<title level="m">a framework for the free flow of non-personal data in the European Union</title>
				<imprint>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
	<note>Communication from the Commission to the European Parliament and the Council, Guidance on the Regulation on</note>
</biblStruct>

<biblStruct xml:id="b38">
	<analytic>
		<title level="a" type="main">The law of everything. Broad concept of personal data and future of EU data protection law</title>
		<author>
			<persName><forename type="first">N</forename><surname>Purtova</surname></persName>
		</author>
		<idno type="DOI">10.1080/17579961.2018.1452176</idno>
	</analytic>
	<monogr>
		<title level="j">Law, Innovation and Technology</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="46" to="48" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b39">
	<analytic>
		<title level="a" type="main">Facebook Linked Data via the Graph API</title>
		<author>
			<persName><forename type="first">J</forename><surname>Weaver</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Tarjan</surname></persName>
		</author>
		<idno type="DOI">10.3233/SW-2012-0078</idno>
	</analytic>
	<monogr>
		<title level="j">Semantic Web</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="245" to="250" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b40">
	<monogr>
		<title level="m" type="main">What are Linked Data and Linked Open Data?</title>
		<author>
			<persName><surname>Ontotext</surname></persName>
		</author>
		<ptr target="https://www.ontotext.com/knowledgehub/fundamentals/linked-data-linked-open-data/" />
		<imprint>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b41">
	<analytic>
		<title level="a" type="main">The Road to European Digital Sovereignty with Gaia-X and IDSA</title>
		<author>
			<persName><forename type="first">A</forename><surname>Braud</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Fromentoux</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Radier</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><forename type="middle">Le</forename><surname>Grand</surname></persName>
		</author>
		<idno type="DOI">10.1109/MNET.2021.9387709</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Network</title>
		<imprint>
			<biblScope unit="volume">35</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="4" to="5" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b42">
	<monogr>
		<ptr target="https://dssc.eu/space/BVE/357073006/Data+Spaces+Blueprint+v1.0" />
		<title level="m">Data Spaces Support Centre, Data Spaces Blueprint v1.0</title>
				<imprint>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
	<note>Data Models</note>
</biblStruct>

<biblStruct xml:id="b43">
	<monogr>
		<ptr target="https://bdva.eu/downloads/" />
		<title level="m">Big Data Value Association, Data sharing spaces and interoperability</title>
				<imprint>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b44">
	<monogr>
		<ptr target="https://eur-lex.europa.eu/eli/reg/2016/679/oj" />
		<title level="m">free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation)</title>
				<imprint>
			<date type="published" when="2016-04">2016. April 2016. 2016</date>
		</imprint>
	</monogr>
	<note>Regulation (EU</note>
</biblStruct>

<biblStruct xml:id="b45">
	<analytic>
		<title level="a" type="main">The Right to Data Protection: The Dualistic Approach</title>
		<author>
			<persName><forename type="first">F</forename><surname>Bieker</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-94-6265-503-4_5</idno>
	</analytic>
	<monogr>
		<title level="m">The Right to Data Protection: Individual and Structural Dimensions of Data Protection in EU Law</title>
				<editor>
			<persName><forename type="first">T</forename><forename type="middle">M C</forename></persName>
		</editor>
		<meeting><address><addrLine>The Hague</addrLine></address></meeting>
		<imprint>
			<publisher>Asser Press</publisher>
			<date type="published" when="2022">2022</date>
			<biblScope unit="page" from="175" to="275" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b46">
	<analytic>
		<title level="a" type="main">schwaches Recht -der neue EU-Datenschutzentwurf</title>
		<author>
			<persName><forename type="first">N</forename><surname>Härting</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Starke</forename><surname>Behörden</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Betriebs-Berater</title>
		<imprint>
			<biblScope unit="volume">459</biblScope>
			<biblScope unit="page" from="459" to="466" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b47">
	<analytic>
		<title level="a" type="main">Interoperability in the Digital Economy</title>
		<author>
			<persName><forename type="first">W</forename><surname>Kerber</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Schweitzer</surname></persName>
		</author>
		<idno type="DOI">10.2139/ssrn.2922515</idno>
	</analytic>
	<monogr>
		<title level="j">JIPITEC</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="39" to="58" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b48">
	<analytic>
		<title level="a" type="main">The right to data portability in the GDPR: Towards user-centric interoperability of digital services</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">De</forename><surname>Hert</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Papakonstantinou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Malgieri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Beslay</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Sanchez</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.clsr.2017.10.003</idno>
	</analytic>
	<monogr>
		<title level="j">Computer Law &amp; Security Review</title>
		<imprint>
			<biblScope unit="volume">34</biblScope>
			<biblScope unit="page" from="193" to="203" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b49">
	<monogr>
		<ptr target="https://ec.europa.eu/justice/article-29/documentation/opinion-recommendation/index_en.htm" />
		<title level="m">Article 29 Working Party, Opinion 4/2007 on the concept of personal data</title>
				<imprint>
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b50">
	<analytic>
		<title level="a" type="main">Comparing definitions of data and information in data protection law and machine learning: A useful way forward to meaningfully regulate algorithms?</title>
		<author>
			<persName><forename type="first">R</forename><surname>Gellert</surname></persName>
		</author>
		<idno type="DOI">10.1111/rego.12349</idno>
	</analytic>
	<monogr>
		<title level="j">Regulation &amp; Governance</title>
		<imprint>
			<biblScope unit="volume">16</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="156" to="176" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b51">
	<analytic>
		<title level="a" type="main">Data Is What Data Does: Regulating Based on Harm and Risk Instead of Sensitive Data</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">J</forename><surname>Solove</surname></persName>
		</author>
		<idno type="DOI">10.2139/ssrn.4322198</idno>
	</analytic>
	<monogr>
		<title level="j">Northwest Univ Law Rev</title>
		<imprint>
			<biblScope unit="volume">118</biblScope>
			<biblScope unit="page" from="1111" to="1127" />
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b52">
	<analytic>
		<title level="a" type="main">The Myth of Individual Control: Mapping the Limitations of Privacy Self-management</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">L</forename><surname>Kröger</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><forename type="middle">H</forename></persName>
		</author>
		<author>
			<persName><forename type="first">.-M</forename><surname>Lutz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Ullrich</surname></persName>
		</author>
		<idno type="DOI">10.2139/ssrn.3881776</idno>
	</analytic>
	<monogr>
		<title level="j">SSRN Electronic Journal</title>
		<imprint>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b53">
	<analytic>
		<title level="a" type="main">The Right to Informational Self-Determination and the Value of Self-Development: Reassessing the Importance of Privacy for Democracy</title>
		<author>
			<persName><forename type="first">A</forename><surname>Rouvroy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Poullet</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-1-4020-9498-9_2</idno>
	</analytic>
	<monogr>
		<title level="m">Reinventing Data Protection?</title>
				<editor>
			<persName><forename type="first">S</forename><surname>Gutwirth</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Y</forename><surname>Poullet</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">P</forename><forename type="middle">De</forename><surname>Hert</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">C</forename><surname>De Terwangne</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">S</forename><surname>Nouwt</surname></persName>
		</editor>
		<meeting><address><addrLine>Netherlands, Dordrecht</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2009">2009</date>
			<biblScope unit="page" from="45" to="76" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b54">
	<analytic>
		<title level="a" type="main">Kafka in the Age of AI and the Futility of Privacy as Control</title>
		<author>
			<persName><forename type="first">D</forename><surname>Solove</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Hartzog</surname></persName>
		</author>
		<idno type="DOI">10.2139/ssrn.4685553</idno>
	</analytic>
	<monogr>
		<title level="j">Boston University Law Review</title>
		<imprint>
			<biblScope unit="volume">104</biblScope>
			<biblScope unit="page">4</biblScope>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b55">
	<analytic>
		<title level="a" type="main">Article 20 Right to data portability</title>
		<author>
			<persName><forename type="first">O</forename><surname>Lynskey</surname></persName>
		</author>
		<idno type="DOI">10.1093/oso/9780198826491.003.0052</idno>
	</analytic>
	<monogr>
		<title level="m">The EU General Data Protection Regulation (GDPR): A Commentary</title>
				<editor>
			<persName><forename type="first">C</forename><surname>Kuner</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">L</forename><forename type="middle">A</forename><surname>Bygrave</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">C</forename><surname>Docksey</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">L</forename><surname>Drechsler</surname></persName>
		</editor>
		<imprint>
			<publisher>Oxford University Press</publisher>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page" from="497" to="507" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b56">
	<monogr>
		<idno>WP242 rev.</idno>
		<ptr target="https://www.edpb.europa.eu/our-work-tools/our-documents/guidelines/guidelines-right-data-portability-under-regulation-2016679_en" />
		<title level="m">data portability under Regulation 2016</title>
				<imprint>
			<date type="published" when="2017">01, 2017</date>
			<biblScope unit="volume">679</biblScope>
		</imprint>
	</monogr>
	<note>Article 29 Data Protection Working Party. Guidelines on the right to</note>
</biblStruct>

<biblStruct xml:id="b57">
	<analytic>
		<title level="a" type="main">The Right to Informational Self-Determination and the Value of Self-Development: Reassessing the Importance of Privacy for Democracy</title>
		<author>
			<persName><forename type="first">A</forename><surname>Rouvroy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Poullet</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-1-4020-9498-9_2</idno>
	</analytic>
	<monogr>
		<title level="m">Reinventing Data Protection?</title>
				<editor>
			<persName><forename type="first">S</forename><surname>Gutwirth</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Y</forename><surname>Poullet</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">P</forename><forename type="middle">De</forename><surname>Hert</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">C</forename><surname>De Terwangne</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">S</forename><surname>Nouwt</surname></persName>
		</editor>
		<meeting><address><addrLine>Netherlands, Dordrecht</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2009">2009</date>
			<biblScope unit="page" from="71" to="74" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b58">
	<analytic>
		<title level="a" type="main">The Right to Data Protection: The Current Doctrinal Discourse</title>
		<author>
			<persName><forename type="first">F</forename><surname>Bieker</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-94-6265-503-4_4</idno>
	</analytic>
	<monogr>
		<title level="m">The Right to Data Protection: Individual and Structural Dimensions of Data Protection in EU Law</title>
				<editor>
			<persName><forename type="first">T</forename><forename type="middle">M C</forename></persName>
		</editor>
		<meeting><address><addrLine>The Hague</addrLine></address></meeting>
		<imprint>
			<publisher>Asser Press</publisher>
			<date type="published" when="2022">2022</date>
			<biblScope unit="page" from="143" to="174" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b59">
	<monogr>
		<title level="m" type="main">The Emergence of Personal Data Protection as a Fundamental Right of the EU, Law, Governance and Technology Series</title>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">González</forename><surname>Fuster</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-319-05023-2</idno>
		<imprint>
			<date type="published" when="2014">2014</date>
			<publisher>Springer International Publishing</publisher>
			<pubPlace>Cham</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b60">
	<analytic>
		<title level="a" type="main">At this rate, everyone will be a [joint] controller of personal data!</title>
		<author>
			<persName><forename type="first">C</forename><surname>Millard</surname></persName>
		</author>
		<idno type="DOI">10.1093/idpl/ipz027</idno>
	</analytic>
	<monogr>
		<title level="j">International Data Privacy Law</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="page" from="217" to="219" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b61">
	<analytic>
		<title level="a" type="main">Re-thinking the allocation of roles under the GDPR in the context of cloud computing</title>
		<author>
			<persName><forename type="first">C</forename><surname>Fischer</surname></persName>
		</author>
		<idno type="DOI">10.1093/idpl/ipad023</idno>
	</analytic>
	<monogr>
		<title level="j">International Data Privacy Law</title>
		<imprint>
			<biblScope unit="volume">14</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="53" to="65" />
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b62">
	<analytic>
		<title level="a" type="main">Responsibility for Data Protection in a Networked World: On the Question of the Controller</title>
		<author>
			<persName><forename type="first">R</forename><surname>Mahieu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">V</forename><surname>Hoboken</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Asghari</surname></persName>
		</author>
		<idno type="DOI">10.2139/ssrn.3256743</idno>
	</analytic>
	<monogr>
		<title level="j">JIPITEC</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="84" to="104" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
	<note>Effective and Complete Protection&quot; and its Application to Data Access Rights in Europe</note>
</biblStruct>

<biblStruct xml:id="b63">
	<analytic>
		<title level="a" type="main">Cobwebs of control: the two imaginations of the data controller in EU law</title>
		<author>
			<persName><forename type="first">M</forename><surname>Finck</surname></persName>
		</author>
		<idno type="DOI">10.1093/idpl/ipab017</idno>
	</analytic>
	<monogr>
		<title level="j">International Data Privacy Law</title>
		<imprint>
			<biblScope unit="volume">11</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="333" to="347" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b64">
	<analytic>
		<title level="a" type="main">Who controls our data?: The legal reasoning of the European Court of Justice in Wirtschaftsakademie Schleswig-Holstein and Tietosuojavaltuutettu v Jehovan todistajat</title>
		<author>
			<persName><forename type="first">S</forename><surname>Lindroos-Hovinheimo</surname></persName>
		</author>
		<idno type="DOI">10.1080/13600834.2019.1623447</idno>
	</analytic>
	<monogr>
		<title level="j">Information &amp; Communications Technology Law</title>
		<imprint>
			<biblScope unit="volume">28</biblScope>
			<biblScope unit="page" from="225" to="238" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b65">
	<analytic>
		<title level="a" type="main">Legislative Compliance Assessment: Framework, Model and GDPR Instantiation</title>
		<author>
			<persName><forename type="first">S</forename><surname>Agarwal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Steyskal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Antunovic</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Kirrane</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-030-02547-2_8</idno>
	</analytic>
	<monogr>
		<title level="m">Privacy Technologies and Policy</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<editor>
			<persName><forename type="first">M</forename><surname>Medina</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">A</forename><surname>Mitrakas</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">K</forename><surname>Rannenberg</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">E</forename><surname>Schweighofer</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">N</forename><surname>Tsouroulas</surname></persName>
		</editor>
		<meeting><address><addrLine>Cham</addrLine></address></meeting>
		<imprint>
			<publisher>Springer International Publishing</publisher>
			<date type="published" when="2018">2018</date>
			<biblScope unit="page" from="131" to="149" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b66">
	<analytic>
		<title level="a" type="main">Analysis of ontologies and policy languages to represent information flows in GDPR</title>
		<author>
			<persName><forename type="first">B</forename><surname>Esteves</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Rodríguez-Doncel</surname></persName>
		</author>
		<idno type="DOI">10.3233/SW-223009</idno>
	</analytic>
	<monogr>
		<title level="j">Semantic Web</title>
		<imprint>
			<biblScope unit="volume">15</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="709" to="743" />
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b67">
	<analytic>
		<title level="a" type="main">Data Privacy Vocabulary (DPV) -Version 2.0</title>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">J</forename><surname>Pandit</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Esteves</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">P</forename><surname>Krog</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Ryan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Golpayegani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Flake</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-031-77847-6_10</idno>
	</analytic>
	<monogr>
		<title level="m">The Semantic Web -ISWC 2024</title>
				<editor>
			<persName><forename type="first">G</forename><surname>Demartini</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">K</forename><surname>Hose</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Acosta</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Palmonari</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">G</forename><surname>Cheng</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">H</forename><surname>Skaf-Molli</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">N</forename><surname>Ferranti</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">D</forename><surname>Hernández</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">A</forename><surname>Hogan</surname></persName>
		</editor>
		<meeting><address><addrLine>Nature Switzerland; Cham</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2024">2024</date>
			<biblScope unit="page" from="171" to="193" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b68">
	<analytic>
		<title level="a" type="main">ODRL Policy Modelling and Compliance Checking</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">De</forename><surname>Vos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Kirrane</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Padget</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Satoh</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-030-31095-0_3</idno>
	</analytic>
	<monogr>
		<title level="m">Rules and Reasoning</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<editor>
			<persName><forename type="first">P</forename><surname>Fodor</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Montali</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">D</forename><surname>Calvanese</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">D</forename><surname>Roman</surname></persName>
		</editor>
		<meeting><address><addrLine>Cham</addrLine></address></meeting>
		<imprint>
			<publisher>Springer International Publishing</publisher>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="36" to="51" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b69">
	<analytic>
		<title level="a" type="main">Limits and Enablers of Data Sharing. An Analytical Framework for EU Competition, Data Protection and Consumer Law</title>
		<author>
			<persName><forename type="first">I</forename><surname>Graef</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Tombal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Streel</surname></persName>
		</author>
		<idno type="DOI">10.2139/ssrn.3494212</idno>
	</analytic>
	<monogr>
		<title level="j">SSRN Electronic Journal</title>
		<imprint>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b70">
	<monogr>
		<author>
			<persName><forename type="first">V</forename><surname>Pavel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Kind</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Strait</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Reeve</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Peppin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Szymielewicz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Veale</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Macdonald</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Lynskey</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Coyle</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Nemitz</surname></persName>
		</author>
		<ptr target="https://www.adalovelaceinstitute.org/wp-content/uploads/2022/11/Ada-Lovelace-Institute-Rethinking-data-and-rebalancing-digital-power-FINAL.pdf" />
		<title level="m">Rethinking data and rebalancing digital power</title>
				<imprint>
			<publisher>Ada Lovelace Institute</publisher>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b71">
	<analytic>
		<title level="a" type="main">A tale of two rights: exploring the potential conflict between right to data portability and right to be forgotten under the General Data Protection Regulation</title>
		<author>
			<persName><forename type="first">W</forename><surname>Li</surname></persName>
		</author>
		<idno type="DOI">10.1093/idpl/ipy007</idno>
	</analytic>
	<monogr>
		<title level="j">International Data Privacy Law</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="page" from="309" to="317" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b72">
	<analytic>
		<title level="a" type="main">Reviving Purpose Limitation and Data Minimisation in Personalisation, Profiling and Decision-Making Systems</title>
		<author>
			<persName><forename type="first">M</forename><surname>Finck</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Biega</surname></persName>
		</author>
		<idno type="DOI">10.2139/ssrn.3749078</idno>
	</analytic>
	<monogr>
		<title level="j">SSRN Electronic Journal</title>
		<imprint>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b73">
	<monogr>
		<ptr target="http://data.europa.eu/eli/reg/2022/868/oj/eng" />
		<title level="m">868 of the European Parliament and of the Council of 30 May 2022 on European data governance and amending Regulation (EU) 2018/1724 (Data Governance Act)</title>
				<imprint>
			<date type="published" when="2022">2022. 2022</date>
		</imprint>
	</monogr>
	<note>Regulation (EU</note>
</biblStruct>

<biblStruct xml:id="b74">
	<monogr>
		<title level="m" type="main">White Paper on the Definition of Data Intermediation Services</title>
		<author>
			<persName><forename type="first">T</forename><surname>Bobev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">K</forename><surname>Dessers</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Ducuing</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Fierens</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Palumbo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Peeters</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Stähler</surname></persName>
		</author>
		<idno type="DOI">10.2139/ssrn.4589987</idno>
		<imprint>
			<date type="published" when="2023">2023</date>
			<publisher>SSRN Scholarly Paper</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b75">
	<monogr>
		<author>
			<persName><forename type="first">J</forename><surname>Baloup</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Bayamlıoğlu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Benmayor</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Ducuing</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Dutkiewicz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Lalova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Miadzvetskaya</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Peeters</surname></persName>
		</author>
		<idno type="DOI">10.2139/ssrn.3872703</idno>
		<title level="m">White Paper on the Data Governance Act</title>
				<imprint>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
	<note type="report_type">SSRN Scholarly Paper</note>
	<note>working Paper. CiTiP Working Paper Series</note>
</biblStruct>

<biblStruct xml:id="b76">
	<analytic>
		<title level="a" type="main">ODRL Profile for Expressing Consent through Granular Access Control Policies in Solid</title>
		<author>
			<persName><forename type="first">B</forename><surname>Esteves</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">J</forename><surname>Pandit</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Rodríguez-Doncel</surname></persName>
		</author>
		<idno type="DOI">10.1109/EuroSPW54576.2021.00038</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE European Symposium on Security and Privacy Workshops (EuroS PW)</title>
				<imprint>
			<date type="published" when="2021">2021. 2021</date>
			<biblScope unit="page" from="298" to="306" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b77">
	<analytic>
		<title level="a" type="main">Profiling: From data to knowledge. The challenges of a crucial technology</title>
		<author>
			<persName><forename type="first">M</forename><surname>Hildebrandt</surname></persName>
		</author>
		<idno type="DOI">10.1007/s11623-006-0140-3</idno>
	</analytic>
	<monogr>
		<title level="j">Datenschutz und Datensicherheit</title>
		<imprint>
			<biblScope unit="volume">30</biblScope>
			<biblScope unit="page" from="548" to="552" />
			<date type="published" when="2006">2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b78">
	<analytic>
		<title level="a" type="main">Data protection law beyond identifiability? Atmospheric profiles, nudging and the Stratumseind Living Lab</title>
		<author>
			<persName><forename type="first">M</forename><surname>Galič</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Gellert</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.clsr.2020.105486</idno>
	</analytic>
	<monogr>
		<title level="j">Computer Law &amp; Security Review</title>
		<imprint>
			<biblScope unit="volume">40</biblScope>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b79">
	<analytic>
		<title level="a" type="main">Tamò-Larrieux, GDPR bypass by design? Transient processing of data under the GDPR</title>
		<author>
			<persName><forename type="first">D</forename><surname>George</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Reutimann</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename></persName>
		</author>
		<idno type="DOI">10.1093/idpl/ipz017</idno>
	</analytic>
	<monogr>
		<title level="j">International Data Privacy Law</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="page" from="285" to="298" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b80">
	<analytic>
		<title level="a" type="main">Data Is What Data Does: Regulating Based on Harm and Risk Instead of Sensitive Data</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">J</forename><surname>Solove</surname></persName>
		</author>
		<idno type="DOI">10.2139/ssrn.4322198</idno>
	</analytic>
	<monogr>
		<title level="j">Northwest Univ Law Rev</title>
		<imprint>
			<biblScope unit="volume">118</biblScope>
			<biblScope unit="page">1134</biblScope>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b81">
	<analytic>
		<title level="a" type="main">Regulation (EU)</title>
		<idno>) 2016/797 and (EU) 2020/1828</idno>
		<ptr target="http://data.europa.eu/eli/reg/2024/1689/oj/eng" />
	</analytic>
	<monogr>
		<title level="m">European Parliament and of the Council of 13 June 2024 laying down harmonised rules on artificial intelligence and amending Regulations (EC)</title>
				<imprint>
			<date type="published" when="1689">2024. 1689. 2008. 2024</date>
			<biblScope unit="volume">300</biblScope>
		</imprint>
	</monogr>
	<note>EU) No 167/2013. EU) No 168/2013. and Directives 2014/90/EU, (EU. Artificial Intelligence Act)</note>
</biblStruct>

<biblStruct xml:id="b82">
	<monogr>
		<ptr target="http://data.europa.eu/eli/reg/2022/2065/oj/eng" />
		<title level="m">European Parliament and of the Council of 19 October 2022 on a Single Market For Digital Services and amending Directive 2000/31/EC (Digital Services Act)</title>
				<imprint>
			<date type="published" when="2022">2022. 2065. 2022</date>
		</imprint>
	</monogr>
	<note>Regulation (EU</note>
</biblStruct>

<biblStruct xml:id="b83">
	<analytic>
		<title level="a" type="main">Code as personal data: implications for data protection law and regulation of algorithms</title>
		<author>
			<persName><forename type="first">N</forename><surname>Purtova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Leenes</surname></persName>
		</author>
		<idno type="DOI">10.1093/idpl/ipad019</idno>
	</analytic>
	<monogr>
		<title level="j">International Data Privacy Law</title>
		<imprint>
			<biblScope unit="volume">13</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="245" to="266" />
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
