Unpacking AI-enabled border management technologies in Greece: To what extent their development and deployment are transparent and respect data protection rules?

IF 3.3 3区 社会学 Q1 LAW
Eleftherios Chelioudakis
{"title":"Unpacking AI-enabled border management technologies in Greece: To what extent their development and deployment are transparent and respect data protection rules?","authors":"Eleftherios Chelioudakis","doi":"10.1016/j.clsr.2024.105967","DOIUrl":null,"url":null,"abstract":"<div><p>This article embarks on a comprehensive examination of two research questions. The first question is “What are the AI-enabled applications, which are developed and deployed in Greece in the border management field?”. The goal is to provide to the reader a thorough listing of these technologies, as well as information regarding the companies that develop them, and the EU funding schemes that support them. By investigating this question, the paper assesses whether there exists transparent information regarding the procurement, development, and deployment phases of such AI tools in Greece, with a keen focus on the accessibility of related documents and data to civil society actors.The second question is “To what extent are the development and deployment of these AI-enabled border management applications in compliance with the applicable data protection provisions?”. There the goal is to register the different breaches of data protection provisions when such AI tools are developed and deployed in practice, taking into account the findings of civil society actors that have challenged the lawful use of such applications in accordance with the related national legal framework enforcing Regulation 2016/679 (GDPR) and transposing the Directive 2016/680.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"53 ","pages":"Article 105967"},"PeriodicalIF":3.3000,"publicationDate":"2024-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Law & Security Review","FirstCategoryId":"90","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0267364924000347","RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"LAW","Score":null,"Total":0}
引用次数: 0

Abstract

This article embarks on a comprehensive examination of two research questions. The first question is “What are the AI-enabled applications, which are developed and deployed in Greece in the border management field?”. The goal is to provide to the reader a thorough listing of these technologies, as well as information regarding the companies that develop them, and the EU funding schemes that support them. By investigating this question, the paper assesses whether there exists transparent information regarding the procurement, development, and deployment phases of such AI tools in Greece, with a keen focus on the accessibility of related documents and data to civil society actors.The second question is “To what extent are the development and deployment of these AI-enabled border management applications in compliance with the applicable data protection provisions?”. There the goal is to register the different breaches of data protection provisions when such AI tools are developed and deployed in practice, taking into account the findings of civil society actors that have challenged the lawful use of such applications in accordance with the related national legal framework enforcing Regulation 2016/679 (GDPR) and transposing the Directive 2016/680.

解读希腊的人工智能边境管理技术:这些技术的开发和部署在多大程度上是透明的并遵守数据保护规则?
本文开始全面研究两个研究问题。第一个问题是 "希腊在边境管理领域开发和部署了哪些人工智能应用?目的是为读者提供一份这些技术的详尽清单,以及有关开发这些技术的公司和支持这些技术的欧盟资助计划的信息。通过对这一问题的调查,本文将评估希腊是否存在有关此类人工智能工具的采购、开发和部署阶段的透明信息,并重点关注民间社会行为者对相关文件和数据的可及性。第二个问题是 "这些人工智能边境管理应用程序的开发和部署在多大程度上符合适用的数据保护规定?第二个问题是 "这些人工智能边境管理应用程序的开发和部署在多大程度上符合适用的数据保护规定?"其目的是登记在实际开发和部署此类人工智能工具时违反数据保护规定的不同情况,同时考虑到民间社会行为者的调查结果,这些行为者根据执行第 2016/679 号法规(GDPR)和移植第 2016/680 号指令的相关国家法律框架,对此类应用程序的合法使用提出了质疑。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
CiteScore
5.60
自引率
10.30%
发文量
81
审稿时长
67 days
期刊介绍: CLSR publishes refereed academic and practitioner papers on topics such as Web 2.0, IT security, Identity management, ID cards, RFID, interference with privacy, Internet law, telecoms regulation, online broadcasting, intellectual property, software law, e-commerce, outsourcing, data protection, EU policy, freedom of information, computer security and many other topics. In addition it provides a regular update on European Union developments, national news from more than 20 jurisdictions in both Europe and the Pacific Rim. It is looking for papers within the subject area that display good quality legal analysis and new lines of legal thought or policy development that go beyond mere description of the subject area, however accurate that may be.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信