{"id":"https://openalex.org/W7130692476","doi":"https://doi.org/10.14763/2026.1.2085","title":"Seeing in the dark: Towards a broad construction of the access to data provisions of the DSA","display_name":"Seeing in the dark: Towards a broad construction of the access to data provisions of the DSA","publication_year":2026,"publication_date":"2026-02-19","ids":{"openalex":"https://openalex.org/W7130692476","doi":"https://doi.org/10.14763/2026.1.2085"},"language":"en","primary_location":{"id":"doi:10.14763/2026.1.2085","is_oa":true,"landing_page_url":"https://doi.org/10.14763/2026.1.2085","pdf_url":"https://policyreview.info/pdf/policyreview-2026-1-2085.pdf","source":{"id":"https://openalex.org/S4210177192","display_name":"Internet Policy Review","issn_l":"2197-6775","issn":["2197-6775"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313659","host_organization_name":"Alexander von Humboldt Institute for Internet and Society","host_organization_lineage":["https://openalex.org/P4310313659"],"host_organization_lineage_names":["Alexander von Humboldt Institute for Internet and Society"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Internet Policy Review","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://policyreview.info/pdf/policyreview-2026-1-2085.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5005969972","display_name":"Beatriz Botero Arcila","orcid":"https://orcid.org/0000-0001-7784-6897"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Beatriz Botero Arcila","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124698701","display_name":"Pedro Ramaciotti","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Pedro Ramaciotti","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5126468307","display_name":"Emma Cabale","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Emma Cabale","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5005969972"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.24277311,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"15","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12943","display_name":"COVID-19 Digital Contact Tracing","score":0.15870000422000885,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12943","display_name":"COVID-19 Digital Contact Tracing","score":0.15870000422000885,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12679","display_name":"Focus Groups and Qualitative Methods","score":0.06769999861717224,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.05180000141263008,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/transparency","display_name":"Transparency (behavior)","score":0.8255000114440918},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.6439999938011169},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.63919997215271},{"id":"https://openalex.org/keywords/data-access","display_name":"Data access","score":0.4821000099182129},{"id":"https://openalex.org/keywords/data-protection-act-1998","display_name":"Data Protection Act 1998","score":0.4611000120639801},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.45179998874664307},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.42570000886917114},{"id":"https://openalex.org/keywords/meaning","display_name":"Meaning (existential)","score":0.40130001306533813},{"id":"https://openalex.org/keywords/interpretation","display_name":"Interpretation (philosophy)","score":0.3968999981880188}],"concepts":[{"id":"https://openalex.org/C2780233690","wikidata":"https://www.wikidata.org/wiki/Q535347","display_name":"Transparency (behavior)","level":2,"score":0.8255000114440918},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.6801999807357788},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.6439999938011169},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.63919997215271},{"id":"https://openalex.org/C39549134","wikidata":"https://www.wikidata.org/wiki/Q133080","display_name":"Public relations","level":1,"score":0.5027999877929688},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.4821000099182129},{"id":"https://openalex.org/C69360830","wikidata":"https://www.wikidata.org/wiki/Q1172237","display_name":"Data Protection Act 1998","level":2,"score":0.4611000120639801},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.45179998874664307},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.42570000886917114},{"id":"https://openalex.org/C2780876879","wikidata":"https://www.wikidata.org/wiki/Q3054749","display_name":"Meaning (existential)","level":2,"score":0.40130001306533813},{"id":"https://openalex.org/C527412718","wikidata":"https://www.wikidata.org/wiki/Q855395","display_name":"Interpretation (philosophy)","level":2,"score":0.3968999981880188},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.3894999921321869},{"id":"https://openalex.org/C2776007630","wikidata":"https://www.wikidata.org/wiki/Q2798912","display_name":"Accountability","level":2,"score":0.3659000098705292},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.36410000920295715},{"id":"https://openalex.org/C165609540","wikidata":"https://www.wikidata.org/wiki/Q1172486","display_name":"Data breach","level":2,"score":0.34880000352859497},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.328000009059906},{"id":"https://openalex.org/C17632256","wikidata":"https://www.wikidata.org/wiki/Q1076968","display_name":"Digital media","level":2,"score":0.32580000162124634},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.32499998807907104},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.30140000581741333},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.29910001158714294},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.29739999771118164},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.2874000072479248},{"id":"https://openalex.org/C184356942","wikidata":"https://www.wikidata.org/wiki/Q830382","display_name":"Best practice","level":2,"score":0.28360000252723694},{"id":"https://openalex.org/C2779813694","wikidata":"https://www.wikidata.org/wiki/Q528053","display_name":"Digital identity","level":3,"score":0.27970001101493835},{"id":"https://openalex.org/C1304207","wikidata":"https://www.wikidata.org/wiki/Q7189582","display_name":"Physical access","level":3,"score":0.2669999897480011},{"id":"https://openalex.org/C193934123","wikidata":"https://www.wikidata.org/wiki/Q7246028","display_name":"Privacy by Design","level":3,"score":0.2590000033378601},{"id":"https://openalex.org/C2778938767","wikidata":"https://www.wikidata.org/wiki/Q1502043","display_name":"Rules of engagement","level":2,"score":0.25440001487731934},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.2529999911785126},{"id":"https://openalex.org/C182306322","wikidata":"https://www.wikidata.org/wiki/Q1779371","display_name":"Order (exchange)","level":2,"score":0.2517000138759613},{"id":"https://openalex.org/C133462117","wikidata":"https://www.wikidata.org/wiki/Q4929239","display_name":"Data collection","level":2,"score":0.25029999017715454}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.14763/2026.1.2085","is_oa":true,"landing_page_url":"https://doi.org/10.14763/2026.1.2085","pdf_url":"https://policyreview.info/pdf/policyreview-2026-1-2085.pdf","source":{"id":"https://openalex.org/S4210177192","display_name":"Internet Policy Review","issn_l":"2197-6775","issn":["2197-6775"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313659","host_organization_name":"Alexander von Humboldt Institute for Internet and Society","host_organization_lineage":["https://openalex.org/P4310313659"],"host_organization_lineage_names":["Alexander von Humboldt Institute for Internet and Society"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Internet Policy Review","raw_type":"journal-article"},{"id":"pmh:oai:HAL:hal-05522872v1","is_oa":true,"landing_page_url":"https://hal.science/hal-05522872","pdf_url":null,"source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Internet Policy Review, 2026, 15 (1), &#x27E8;10.14763/2026.1.2085&#x27E9;","raw_type":"Journal articles"},{"id":"pmh:oai:doaj.org/article:282ff7436db44fd29745ff72090128d6","is_oa":true,"landing_page_url":"https://doaj.org/article/282ff7436db44fd29745ff72090128d6","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Internet Policy Review, Vol 15, Iss 1 (2026)","raw_type":"article"},{"id":"pmh:oai:econstor.eu:10419/339540","is_oa":true,"landing_page_url":"https://hdl.handle.net/10419/339540","pdf_url":null,"source":{"id":"https://openalex.org/S4306401696","display_name":"Econstor (Econstor)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"doc-type:article"}],"best_oa_location":{"id":"doi:10.14763/2026.1.2085","is_oa":true,"landing_page_url":"https://doi.org/10.14763/2026.1.2085","pdf_url":"https://policyreview.info/pdf/policyreview-2026-1-2085.pdf","source":{"id":"https://openalex.org/S4210177192","display_name":"Internet Policy Review","issn_l":"2197-6775","issn":["2197-6775"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313659","host_organization_name":"Alexander von Humboldt Institute for Internet and Society","host_organization_lineage":["https://openalex.org/P4310313659"],"host_organization_lineage_names":["Alexander von Humboldt Institute for Internet and Society"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Internet Policy Review","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.49493348598480225,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7130692476.pdf"},"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"The":[0],"Digital":[1],"Services":[2],"Act":[3],"(DSA)":[4],"is":[5,28],"the":[6,22,51,59,67,76,85,94,104,189,192,219,230,241],"most":[7],"ambitious":[8],"effort":[9],"taken":[10],"by":[11,29,58],"liberal":[12],"democratic":[13],"nations":[14],"to":[15,35,73,84,107,112,134,183,187,202,239],"regulate":[16],"social":[17,152,170,184],"media":[18,153,171,185],"platforms.":[19],"One":[20],"of":[21,61,66,79,90,117,151,191,221,229,245],"main":[23],"ways":[24],"it":[25],"does":[26],"this":[27],"establishing":[30],"various":[31],"transparency":[32,46],"obligations":[33],"applicable":[34],"all":[36],"platforms":[37,53],"and":[38,47,54,88,110,155],"search":[39,55],"engines,":[40,56],"as":[41,43],"well":[42],"a":[44,114],"specific":[45,115],"data-sharing":[48],"regime":[49],"for":[50,103],"largest":[52],"defined":[57],"number":[60],"users.":[62,223],"Specifically,":[63],"Article":[64,100],"40":[65],"DSA":[68],"grants":[69],"vetted":[70,176],"researchers":[71,124,146,177,199,238],"access":[72,129,133,182,201],"data":[74,106,135,186,206,232],"\u201cfor":[75],"sole":[77],"purpose":[78],"conducting":[80],"research":[81,118],"that":[82,99,198,207,235],"contributes":[83],"detection,":[86],"identification":[87],"understanding":[89],"systemic":[91],"risks":[92],"in":[93],"Union.\u201d":[95],"This":[96],"article":[97],"argues":[98],"40's":[101],"requirement":[102],"requested":[105],"be":[108],"\u201cnecessary":[109],"proportionate\u201d":[111],"conduct":[113],"type":[116],"may":[119,157,178],"hinder":[120],"effective":[121],"research.":[122],"Indeed,":[123],"have":[125,147,158],"been":[126],"denied":[127],"broad":[128,181],"\u2013":[130,136],"or":[131,139,214],"any":[132],"on":[137,168],"privacy":[138],"confidentiality":[140],"grounds":[141],"before":[142],"(Bontcheva,":[143],"2024).":[144],"Consequently,":[145,224],"limited":[148,159],"prior":[149],"knowledge":[150,160],"impacts":[154],"thus":[156,179],"about":[161],"what":[162],"data,":[163,204],"exactly,":[164],"they":[165],"need.":[166],"Drawing":[167],"cutting-edge":[169],"research,":[172],"we":[173,196,225],"explain":[174],"why":[175],"need":[180,200],"meet":[188],"objectives":[190],"DSA.":[193],"More":[194],"specifically,":[195],"argue":[197],"system-level":[203],"meaning":[205],"captures":[208],"how":[209],"an":[210,227],"entire":[211],"digital":[212],"system":[213],"platform":[215],"operates,":[216],"not":[217],"just":[218],"activity":[220],"individual":[222],"propose":[226],"interpretation":[228],"DSA's":[231],"request":[233],"requirements":[234],"would":[236],"enable":[237],"study":[240],"online":[242],"political":[243],"landscape":[244],"EU":[246],"member":[247],"states":[248],"effectively.":[249]},"counts_by_year":[],"updated_date":"2026-05-07T13:39:58.223016","created_date":"2026-02-21T00:00:00"}
