Personal Data Management in Smart Product-Service Systems: Preliminary Design Strategies to Avoid User Manipulation in Democratic Processes
Abstract
:1. Introduction
- -
- What are the design features that can foster key democratic-related elements for personal data management in smart PSSs?
- -
- How can these features be applied in the design of smart PSSs to mitigate user manipulation?
2. Method
3. Democratic-Related Elements and Their Relevance to Personal Data
3.1. Privacy
3.2. Transparency
3.3. Participation
3.4. Relations and Guiding Questions
4. Cases and Features Analysis
4.1. Sample of Cases
4.2. Features and Elements
- Privacy: The characteristics of this category are exclusively associated with the concept of privacy. They can be favoured independently of the user’s awareness. For example, encryption can safeguard and enhance the user’s interests without their knowledge. This illustrates that strategies related to privacy do not necessitate the user’s awareness. Privacy can assist in the improvement of people’s freedom and reduction in manipulation; however, without transparency and the inclusion of users in deliberations and collaboration about the development of solutions, privacy support to avoid manipulation is limited.
- Transparency: The Alias Domains, XAI, Open Changelog, and Open Data features offer users insights into the ways in which data are utilized. The Handbook and Digital Literacy content facilitate the development of knowledge among users. Although they assist users seeking accountability, they do not necessarily prevent data privacy from being violated.
- Privacy and Transparency: The features here show the transparency and privacy possible relations. They provide higher privacy for users on their data and present them with information on what is happening, with the option to modify this information. For example, the “opt” functions indicate that data collection is occurring and allow users to enable or disable these functionalities within the solution. However, they lack a mechanism to enable users to provide feedback and participate in the development of the system structure.
- Participation and Transparency: The features of this group provide a way for the user to be involved in the development of the solution structures. Although they may offer privacy to users who demand accountability, they do not guarantee or aim to do so. Thus, privacy enhancement through these features is not certain.
- All elements: The Blocklist, Chosen Server, and DPO features have shown that there are possibilities for having the three elements together. Transparency appears to facilitate a connection between the elements of privacy and participation but does not automatically guarantee them.
- Participation and Privacy: None of the presented features demonstrated the combination of privacy and participation or only participation without transparency. Without the openness of information, people cannot learn about problems and participate in the changes.
4.3. Clusters and Preliminary Strategies
5. Preliminary Strategies
- Alter: To alter or scramble personal data, making it unidentifiable to outsiders. Examples of features for this are IP anonymization, encryption, VPN and TOR.
- Block: To block the transmission of personal data to third-party applications, such as trackers and fingerprints. Examples of features are AdBlock and Blocklist.
- Decentralize: To use a type of decentralized personal data system to ensure that user data are not concentrated in a single organization. Examples of features include cryptocurrency transactions, decentralized storage, and matrix API.
- Comply: To comply with personal data laws, regulations, and best practises and make them available and clear to the user. Examples of features include certifications, compliance disclosures and policy disclosures.
- Incentivise: To and its organization encourage data ethics actions, support research and development, and encourage users to refine their privacy standards and identify potential issues. Examples of features are rewarding ethical behaviour and ethical actions.
- Inform: To provide education and information to stakeholders and users about solution structures and data ethics. Examples of features include open data, manual, digital literacy content, and open changelog.
- Monitor: To continuously monitor and update its data ethics parameters and provide reports to users. Examples of features are AI automated data security, attack resistance management, compliance scan, and DPO.
- Trace: To provide a means for the user to trace the path or logic of their data process within the solution. Examples of features include alias domains and XAI.
- Own: To allow users to own and manage their data. Examples of features include downloadable files, data ownership, downloadable software and self-hosted servers.
- Switch: To allow users to switch data collection on or off according to their needs. Examples of features include opt-in ads and rewards, opt-out tracking, and physical kill switches.
- Locate: To disclose to users the physical location where their data are stored and processed. Examples of features include private server, regional server, disclosed server location (with more precise location) and chosen server.
- Own: To allow users to own and manage their data. Examples of features include downloadable files, data ownership, downloadable software and self-hosted servers.
- Port: To allow users to port their data to other similar solutions, ensuring compatibility of data formats. An example of a feature is open file format.
- Assemble: To provide a space for users to discuss data policies and processes. Examples of features include a forum on the main app or webpage of the solution and an external web chat channel.
- Contribute: To allow users to contribute to and change the structure and content of the solution. Examples of features are open-source external parts, open source, community-driven, support C2C, and local knowledge.
- Support Financially: To offer users the opportunity to financially support the solution for its economic sustainability, not based on data extraction. Examples of features are sponsors and donors, financial trading and employee ownership.
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Appendix A
Feature | Description |
---|---|
Ad-Blocker | Block profiling, tracking, unwanted and illegal data collection. |
AI Automated Data Security | AI-driven data security management tool that can map and correct problems such as sensitive data breach in real time. |
Alias domains | Alternative email addresses to identify if it has been sold to third parties. |
Anonymize IP | Scrambles IP addresses to protect user location data. |
Attack resistance management | Inviting “ethical hackers” to find and report vulnerabilities. |
Blocklist | List of malicious domains to block unwanted data collection. |
Certifications | Certification and awards enforce rules over users’ data collection and expose protocols, especially when it involves external validation. |
Chosen server | Hosting location options for user data. |
Community driven | Collaborative development of the solution by users, professionals, and organizations. |
Compliance scan | Automated scan tools for auditability and compliance. |
Crypto transactions | Decentralized banking based on blockchain, independent of central authorities and with enhanced privacy. |
Data Ownership | Users control their data, including deletion and storage choices. |
Data Protection Officer (DPO) | GDPR-related function of an external consultant who guarantees data protection while having a communication channel with users. |
Decentralized storage | Decentralized redundant storage, such as Torrent. It enhances data privacy and resilience. |
Digital Literacy content | Informative material on digital literacy, data ethics, and cybersecurity. |
Disclosed server location | Exact or approximate location of the personal data storage can reveal its commitment to comply with local data laws. |
Downloadable Files | Data are downloadable and erasable, but not always transferable. |
Downloadable Software | Software can be downloaded and modified, and users’ files stay on the device. |
Employee ownership | Shared ownership between employees fostering decentralized control. |
Encryption | Makes data unreadable for protection. It has different types, such as protecting data in transit, at rest or end-to-end. |
Ethical actions | Support for research and policy development on data ethics. |
Ethical behaviour reward | Users and other stakeholders’ rewards for ethical data practises. |
Explainable AI (XAI) | Report of the algorithm path over its results for enhancing understanding and transparency. |
External webchat channel | External communication channels for knowledge sharing, such as social media platforms. |
Financial Trade | Offer of paid products and services to ensure economic sustainability independent of personal data. |
Forum | Public discussion area in the solution about the solution. |
Handbook | Encyclopedic guide covering the solution structure, policies, and documentation for users, customers, and developers (in case of open source). |
Law Compliance | Information about compliance with different laws and regulations (of different countries), enforcing basic rules over data collection. |
Local Knowledge | Regional contributions of users, ensuring local expertise, accuracy and relevance. |
Matrix API | Distributes data across volunteer nodes for enhanced communication privacy. |
Open Changelog | Public record of the source code changes aiding accountability. |
Open Data | Access to the source code and data for transparency and community use under credit attribution. |
Open file format | Non-proprietary files ensuring data access outside the solution, freeing the user from dependency and preserving data for the long term. |
Open-Source | Source-code availability enabling users and developers to view, modify, and collaborate. It has different types, from fully to partially open (closed core or extension). |
Open-Source external parts | Use of open-source software in the solution, such as GNU and Linux. |
Opt-in ads and rewards | Non-profiling ads with rewards for users’ attention. |
Opt-out tracking | Allows users to disable tracking, providing clear information when it is collection information. |
Physical Kill Switches | Physical switches to disable transmissions and sensors. |
Policies | Internal policies beyond legislation, such as privacy by design protocols, and involvement with NGOs following recommendations of specialists, such as Global Privacy Control. |
Private server | Organization-owned servers ensure higher data security against third-party servers. |
Regional server | Data allocated to the nearest region of the user and comply with local data laws. |
Self-hosted server | Users store their data on their own devices. |
Sponsors/donors | Independent funding by users can promote transparency. |
Support C2C | Community-led project encouraging knowledge sharing, where more experienced users provide support to less experienced ones. |
TOR | Anonymous communication through a global network of volunteer nodes. |
VPN | Redirects IP address to a remote server, hiding users’ online activity. |
References
- Floridi, L. The Fight for Digital Sovereignty: What It Is, and Why It Matters, Especially for the EU. Philos. Technol. 2020, 33, 369–378. [Google Scholar] [CrossRef] [PubMed]
- Morozov, E. ‘Capitalism’s New Clothes’, The Baffler. Available online: https://thebaffler.com/latest/capitalisms-new-clothes-morozov (accessed on 22 April 2024).
- Han, B. Ecodesign—A Promising Approach to Sustainable Production and Consumption; United Nations Environment Programme (UNEP): Paris, France, 1997; Available online: https://cir.nii.ac.jp/crid/1573105974909900160 (accessed on 27 September 2023).
- Zuboff, S. The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power; First trade paperback edition; PublicAffairs: New York, NY, USA, 2020. [Google Scholar]
- Ruppert, E.; Isin, E.; Bigo, D. Data politics. Big Data Soc. 2017, 4, 2053951717717749. [Google Scholar] [CrossRef]
- O’Neil, C. Weapons of Math Destruction; Crown Publishing Group: New York, NY, USA, 2017; Available online: https://www.penguin.co.uk/books/304513/weapons-of-math-destruction-by-oneil-cathy/9780141985411 (accessed on 22 April 2024).
- How to Win Elections in the 21st Century… and How to Save Democracy—European Parliament. 7 November 2018. Available online: https://www.youtube.com/watch?v=YUCxQv3xqso (accessed on 27 January 2024).
- Delmastro, M.; Nicita, A. Big Data: Come Stanno Cambiando il Nostro Mondo; In Farsi Un’idea, No. 274; Il Mulino: Bologna, Italy, 2019. [Google Scholar]
- Cadwalladr, C.; Graham-Harrison, E. Revealed: 50 Million Facebook Profiles Harvested for Cambridge Analytica in Major Data Breach—Cambridge Analytica the Guardian. Available online: https://www.theguardian.com/news/2018/mar/17/cambridge-analytica-facebook-influence-us-election (accessed on 2 April 2023).
- Li, A.Q.; Found, P. Towards Sustainability: PSS, Digital Technology and Value Co-creation. Procedia CIRP 2017, 64, 79–84. [Google Scholar] [CrossRef]
- Watanabe, K.; Kishita, Y.; Tsunetomo, K. Conceptual design framework for digital technology assisted service system. In Proceedings of the ServDes2020, Melbourne, Australia, 2–5 February 2021. [Google Scholar]
- Zheng, P.; Wang, Z.; Chen, C.-H. Smart product-service systems: A novel transdisciplinary sociotechnical paradigm. In Advances in Transdisciplinary Engineering; Hiekata, W.N., Moser, B.K., Moser, B., Inoue, M., Stjepandic, J., Eds.; IOS Press BV: Amsterdam, The Netherlands, 2019; pp. 234–241. [Google Scholar] [CrossRef]
- Li, A.Q.; Rich, N.; Found, P.; Kumar, M.; Brown, S. Exploring product–service systems in the digital era: A socio-technical systems perspective. TQM J. 2020, 32, 897–913. [Google Scholar] [CrossRef]
- Valencia, A.; Mugge, R.; Schoormans, J.; Schifferstein, R. The Design of Smart Product-Service Systems (PSSs): An Exploration of Design Characteristics. Int. J. Des. 2015, 9, 13–28. [Google Scholar]
- Zheng, P.; Lin, T.-J.; Chen, C.-H.; Xu, X. A systematic design approach for service innovation of smart product-service systems. J. Clean. Prod. 2018, 201, 657–667. [Google Scholar] [CrossRef]
- Petrecca, A.C.C.; Vezzoli, C. The social influences of digital technologies in the Design of S.PSS and DE: A literature review. In IASDR 2023: Life-Changing Design; Design Research Society: Milan, Italy, 2023; pp. 1–16. [Google Scholar] [CrossRef]
- Helbing, D.; Mahajan, S.; Fricker, R.H.; Musso, A.; Hausladen, C.I.; Carissimo, C.; Carpentras, D.; Stockinger, E.; Sanchez-Vaquerizo, J.A.; Yang, J.C.; et al. Democracy by Design: Perspectives for Digitally Assisted, Participatory Upgrades of Society. J. Comput. Sci. 2023, 71, 102061. [Google Scholar] [CrossRef]
- Kranzberg, M. Technology and History: “Kranzberg’s Laws”. Technol. Cult. 1986, 27, 544–560. [Google Scholar] [CrossRef]
- Friedman, B.; Hendry, D.F. Value Sensitive Design: Shaping Technology with Moral Imagination; The MIT Press: Cambridge, MA, USA; London, UK, 2019. [Google Scholar]
- Winograd, T.; Flores, F. Understanding Computers and Cognition: A New Foundation for Design; 24th Printing; Addison-Wesley: Boston, MA, USA, 2008. [Google Scholar]
- Vezzoli, C.A.; Macrì, L.; Takacs, B.; Yang, D. System Design for Sustainability in Practice, 1st ed.; Maggioli spa: Rimini, Italy, 2022. [Google Scholar] [CrossRef]
- Clark, G.; Crul, M.R.M.; Diehl, J.C. Design for Sustainability: A Practical Approach for Developing Economies; United Nations Environment Programme (UNEP): Paris, France, 2006. [Google Scholar]
- Tukker, A.; Tischner, U. (Eds.) New Business for Old Europe: Product-Service Development, Competitiveness and Sustainability; Greenleaf Publishing: Sheffield, UK, 2006. [Google Scholar]
- Pitt, J.; Ober, J. Democracy by Design: Basic Democracy and the Self-Organisation of Collective Governance. In Proceedings of the 2018 IEEE 12th International Conference on Self-Adaptive and Self-Organizing Systems (SASO), Trento, Italy, 3–7 September 2018; pp. 20–29. [Google Scholar] [CrossRef]
- Thomas, N.L. Democracy by Design. J. Public Delib. 2014, 10, 17. Available online: https://www.publicdeliberation.net/jpd/vol10/iss1/art17 (accessed on 9 April 2024). [CrossRef]
- van den Hoven, J. ICT and Value Sensitive Design. In The Information Society: Innovation, Legitimacy, Ethics and Democracy In Honor of Professor Jacques Berleur s.j.; Goujon, P., Lavelle, S., Duquenoy, P., Kimppa, K., Laurent, V., Eds.; Springer: Boston, MA, USA, 2007; pp. 67–72. [Google Scholar] [CrossRef]
- Helbing, D.; Frey, B.S.; Gigerenzer, G.; Hafen, E.; Hagner, M.; Hofstetter, Y.; van den Hoven, J.; Zicari, R.V.; Zwitter, A. Will Democracy Survive Big Data and Artificial Intelligence? In Essays on the Dark and Light Sides of the Digital Revolution; Springer: Cham, Switzerland, 2019; pp. 73–98. [Google Scholar] [CrossRef]
- Robbins, S.; Henschke, A. The Value of Transparency: Bulk Data and Authoritarianism. Surveill. Soc. 2017, 15, 582–589. [Google Scholar] [CrossRef]
- Held, D. Models of Democracy, 3rd ed.; Stanford Univ. Press: Stanford, CA, USA, 2006. [Google Scholar]
- Creswell, J.W. Research Design, 3rd ed.; SAGE: Los Angeles, CA, USA, 2009. [Google Scholar]
- Liu, J.; Liu, Z.; Yang, Q.; Osmani, M.; Demian, P. A Conceptual Blockchain Enhanced Information Model of Product Service Systems Framework for Sustainable Furniture. Buildings 2022, 13, 85. [Google Scholar] [CrossRef]
- Birch, A.H. The Concepts and Theories of Modern Democracy, 3rd ed.; Routledge: London, UK, 2007. [Google Scholar]
- Keane, J. The Life and Death of Democracy; Pocket Books: London, UK; Sydney, Australia; New York, NY, USA; Toronto, ON, Canada, 2010. [Google Scholar]
- Cambridge University. Cambridge Dictionary. Available online: https://dictionary.cambridge.org (accessed on 29 January 2024).
- European Union. Report of the High Level Group on European Democracy; European Committee of the Regions: Brussels, Belgium, 2022; Available online: https://data.europa.eu/doi/10.2863/643553 (accessed on 15 September 2024).
- Fischli, R. Data-owning democracy: Citizen empowerment through data ownership. Eur. J. Political Theory 2024, 23, 204–223. [Google Scholar] [CrossRef]
- Mavriki, P.; Karyda, M. Big Data Analytics: From Threatening Privacy to Challenging Democracy. In Communications in Computer and Information Science; Springer: Berlin/Heidelberg, Germany, 2020; Volume 1111, pp. 3–17. [Google Scholar] [CrossRef]
- Aradau, C.; Cluskey, E.M. Making Digital Surveillance Unacceptable? Security, Democracy, and the Political Sociology of Disputes. Int. Political Sociol. 2022, 16, olab024. [Google Scholar] [CrossRef]
- García, C.S. Digital expansionism and big tech companies: Consequences in democracies of the European Union. Humanit. Soc. Sci. Commun. 2024, 11, 448. [Google Scholar] [CrossRef]
- Schnell, S. Transparency in a “Post-Fact” World. Perspect. Public Manag. Gov. 2022, 5, 222–231. [Google Scholar] [CrossRef]
- Nicastro, M.L.; Santos, A.D. Sustainability transparency: Scope for digital services: Transparência para sustentabilidade: Escopo em serviços digitais. MIX Sustent 2023, 9, 181–199. [Google Scholar] [CrossRef]
- Aytac, U. Digital Domination: Social Media and Contestatory Democracy. Political Stud. 2024, 72, 6–25. [Google Scholar] [CrossRef]
- Baack, S. Datafication and empowerment: How the open data movement re-articulates notions of democracy, participation, and journalism. Big Data Soc. 2015, 2. [Google Scholar] [CrossRef]
- Peters, M.A.; Jandrić, P. Dewey’s Democracy and Education in the age of digital reason: The global, ecological and digital turns. Open Rev. Educ. Res. 2017, 4, 205–218. [Google Scholar] [CrossRef]
- United Nations. Vienna Declaration and Programme of Action; United Nations: Vienna, Austria, 1993; Available online: https://www.ohchr.org/en/about-democracy-and-human-rights (accessed on 15 September 2024).
- Ruijer, E.; Dymanus, C.; van Kesteren, E.-J.; Boeschoten, L.; Meijer, A. Open data work for empowered deliberative democracy: Findings from a living lab study. Gov. Inf. Q. 2024, 41, 101902. [Google Scholar] [CrossRef]
STRING | RESULT | F1 | F2 | F3 |
(TITLE (democracy) AND TITLE (data OR digital)) AND PUBYEAR > 2014 AND PUBYEAR < 2024 AND (LIMIT-TO (DOCTYPE, “ar”)) AND (LIMIT-TO (LANGUAGE, “English”)) | 107 | 48 | 22 | 7 |
Element | Guiding Questions |
---|---|
● Privacy | Does the solution enhance users’ privacy, reducing manipulation, or improving their self-determination and freedom over their data? |
● Transparency | Does the solution provide accurate and clear information about how and what data are used and how they are regulated, ensuring awareness, knowledge building, and accountability? |
● Participation | Does the solution encourage different stakeholders to come together, discuss, and exchange ideas about how their data are being used and their participation in the collaborative development and management of the system (rather than passive exploitation of data)? |
Name | Offer |
---|---|
Librem 5 | Mobile phone, sim card |
Home Assistant | Central smart home system management app, cloud, hub |
diaspora | Social media platform, distributed data management |
Brave | Browser; search engine; virtual private network (VPN); ad-block; artificial intelligence (AI) chat |
Signal | Communication app |
Skiff | Email manager |
GitLab | Development, security, and operations (DevSecOp) platform |
ErnieApp | Privacy knowledge manager (PKM) |
matomo | Web statistic tool |
Whonix Project | Operational system |
DeepL Translate | Translation |
Obsidian | Digital Notepad |
Qwant | Search engine; ad-block; maps |
hCaptcha | Captcha |
Cludo | Search engine |
uBlock Origin | Ad-block |
Whereby | Webinar app |
TOR browser | Browser |
LimeSurvey | Feedback tool |
SupWiz | Chatbot |
Vivaldi | Browser; e-mail; calendar; notepad; translator; contacts |
Brevo | Newsletter tool |
Varonis | Privacy knowledge manager (PKM) |
Hetzner | Cloud |
Social media | |
Open Street Map | Maps |
Etracker | Web statistic tool |
Clever Reach | Newsletter |
DuckDuckGo | Browser; search engine; maps; e-mail |
Nextcloud | Cloud; documents suite; chat; calendar |
Features | Elements |
---|---|
Anonymise IP; Encryption; VPN; TOR; Crypto transactions; Decentralized storage; Matrix API | ● Privacy |
Alias domains; Explainable AI (XAI); Open Data; Handbook; Digital Literacy content; Open Changelog; | ● Transparency |
Opt-in ads and rewards; Opt-out tracking; Physical Kill Switches; AdBlock; Certifications; Law Compliance; Policies; Ethical behaviour reward; Ethical actions; Private server; Regional server; Disclosed server location; AI Automated Data Security; Attack resistance management; Compliance scan; Downloadable Files; Data Ownership; Downloadable Software; Self-hosted server; Open file format; | ●● Transparency Privacy |
Forum; External webchat channel; Open-Source; external parts; Open-Source; Community driven; Support C2C; Local Knowledge; Sponsors and donors; Financial Trade; Employee ownership; | ●● Participation Transparency |
Chosen server; Blocklist; DPO; | ●●● Participation Transparency Privacy |
Cluster | Features | Elements |
---|---|---|
User data protection | ||
Alter | Anonymise IP; Encryption; VPN; TOR | ● |
Decentralize | Crypto transactions; Decentralized storage; Matrix API | |
Block | AdBlock | ●● |
Blocklist | ●●● | |
User guidance | ||
Inform | Open Data; Handbook; Digital Literacy content; Open Changelog | ● |
Trace | Alias domains; XAI | |
Incentivize | Ethical behaviour reward; Ethical actions | ●● |
Comply | Certifications; Law Compliance; Policies | |
Monitor | AI Automated Data Security; Attack resistance management; Compliance scan | |
DPO | ●●● | |
User control | ||
Own | Downloadable Files; Data Ownership; Downloadable Software; Self-hosted server | ●● |
Port | Open file format | |
Switch | Opt-in ads and rewards; Opt-out tracking; Physical Kill Switches | |
Locate | Private server; Regional server; Disclosed server location | |
Chosen server | ●●● | |
User collaboration | ||
Assemble | Forum; External webchat channel | ●● |
Contribute | Open-Source external parts; Open-Source; Community driven; Support C2C; Local Knowledge | |
Support financially | Sponsors and donors; Financial Trade; Employee ownership |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Canfield Petrecca, A.C.; Vezzoli, C.; Ceschin, F. Personal Data Management in Smart Product-Service Systems: Preliminary Design Strategies to Avoid User Manipulation in Democratic Processes. Sustainability 2024, 16, 10110. https://doi.org/10.3390/su162210110
Canfield Petrecca AC, Vezzoli C, Ceschin F. Personal Data Management in Smart Product-Service Systems: Preliminary Design Strategies to Avoid User Manipulation in Democratic Processes. Sustainability. 2024; 16(22):10110. https://doi.org/10.3390/su162210110
Chicago/Turabian StyleCanfield Petrecca, Alessandra C., Carlo Vezzoli, and Fabrizio Ceschin. 2024. "Personal Data Management in Smart Product-Service Systems: Preliminary Design Strategies to Avoid User Manipulation in Democratic Processes" Sustainability 16, no. 22: 10110. https://doi.org/10.3390/su162210110
APA StyleCanfield Petrecca, A. C., Vezzoli, C., & Ceschin, F. (2024). Personal Data Management in Smart Product-Service Systems: Preliminary Design Strategies to Avoid User Manipulation in Democratic Processes. Sustainability, 16(22), 10110. https://doi.org/10.3390/su162210110