Computer Law & Security Review最新文献

筛选
英文 中文
Global data governance at a turning point? Rethinking China-U.S. cross-border data flow regulatory models 全球数据治理正处于转折点?反思中美跨境数据流监管模式
IF 3.3 3区 社会学
Computer Law & Security Review Pub Date : 2024-09-30 DOI: 10.1016/j.clsr.2024.106061
{"title":"Global data governance at a turning point? Rethinking China-U.S. cross-border data flow regulatory models","authors":"","doi":"10.1016/j.clsr.2024.106061","DOIUrl":"10.1016/j.clsr.2024.106061","url":null,"abstract":"<div><div>China and the United States have traditionally represented the ‘security paradigm’ and ‘freedom paradigm’ in their regulatory approaches to cross-border data flow. However, with the introduction of new rules governing these flows in both countries, this article challenges that perspective and explores the potential implications of this shift for global data governance. Specifically, it analyzes how the recent regulations in China and the United States serve as critical turning points affecting the transition between these paradigms, focusing on the overall regulatory frameworks and institutional developments in both nations. The article provides legal, institutional, and case-based examples to illustrate these changes. Furthermore, it offers a comparative analysis of the existing models for cross-border data flow regulation between China and the United States. Targeted compliance advice is provided for multinational corporations and other businesses frequently engaging in international operations that may be impacted by these regulatory changes. This research aims to deliver comprehensive insights into the latest regulatory developments in both countries and their existing models for cross-border data governance, thereby assisting enterprises in developing effective compliance strategies in practice.</div></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":null,"pages":null},"PeriodicalIF":3.3,"publicationDate":"2024-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142359326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Collective cyber situational awareness in EU. A political project of difficult legal realisation? 欧盟的集体网络态势感知。法律上难以实现的政治项目?
IF 3.3 3区 社会学
Computer Law & Security Review Pub Date : 2024-09-23 DOI: 10.1016/j.clsr.2024.106055
{"title":"Collective cyber situational awareness in EU. A political project of difficult legal realisation?","authors":"","doi":"10.1016/j.clsr.2024.106055","DOIUrl":"10.1016/j.clsr.2024.106055","url":null,"abstract":"<div><div>From 2020 onward, the European cybersecurity strategy has seen a major reformulation of its objectives given the changed international environment. The policy documents reveal an interest in the establishment of an increasingly integrated overall security system, in which the relevant institutions of the Union have a central role. Among the various aspects considered is the establishment of a “collective situational awareness” based on the exchange of security information between Member States and European authorities, as well as between the Union authorities themselves. The sharing of security information is certainly an expression of the capacity for cooperation among Member States in the “Area of Freedom, Security and Justice” of the European Union. The analysis proposed in this contribution aims to study the organisation and procedures of information exchange to counter cyber threats (cybersecurity information sharing) in light of recent legislative interventions in the field of cybersecurity. After analysing the evolution of European administrations, and the tools employed in cybersecurity information sharing practices, the investigation focuses on the dynamic profiles related to the treatment of personal data and sensitive and classified information contained in said information by the different actors involved in the sharing process (private entities, single points of contact, law enforcement agencies, European institutions). The conclusions aim to formulate some considerations on the current state of the art in cybersecurity information sharing practices.</div></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":null,"pages":null},"PeriodicalIF":3.3,"publicationDate":"2024-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0267364924001213/pdfft?md5=42edd971292c8f2500a8a9b406de54f6&pid=1-s2.0-S0267364924001213-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142310363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assessing trustworthy AI: Technical and legal perspectives of fairness in AI 评估值得信赖的人工智能:从技术和法律角度看人工智能的公平性
IF 3.3 3区 社会学
Computer Law & Security Review Pub Date : 2024-09-18 DOI: 10.1016/j.clsr.2024.106053
{"title":"Assessing trustworthy AI: Technical and legal perspectives of fairness in AI","authors":"","doi":"10.1016/j.clsr.2024.106053","DOIUrl":"10.1016/j.clsr.2024.106053","url":null,"abstract":"<div><p>Artificial Intelligence systems are used more and more nowadays, from the application of decision support systems to autonomous vehicles. Hence, the widespread use of AI systems in various fields raises concerns about their potential impact on human safety and autonomy, especially regarding fair decision-making. In our research, we primarily concentrate on aspects of non-discrimination, encompassing both group and individual fairness. Therefore, it must be ensured that decisions made by such systems are fair and unbiased. Although there are many different methods for bias mitigation, few of them meet existing legal requirements. Unclear legal frameworks further worsen this problem. To address this issue, this paper investigates current state-of-the-art methods for bias mitigation and contrasts them with the legal requirements, with the scope limited to the European Union and with a particular focus on the AI Act. Moreover, the paper initially examines state-of-the-art approaches to ensure AI fairness, and subsequently, outlines various fairness measures. Challenges of defining fairness and the need for a comprehensive legal methodology to address fairness in AI systems are discussed. The paper contributes to the ongoing discussion on fairness in AI and highlights the importance of meeting legal requirements to ensure fairness and non-discrimination for all data subjects.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":null,"pages":null},"PeriodicalIF":3.3,"publicationDate":"2024-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0267364924001195/pdfft?md5=0ceed31afa59a3035b0d9fa71674adcc&pid=1-s2.0-S0267364924001195-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142239457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Resettlement by algorithm: Can artificial intelligence uphold human rights? 通过算法重新安置:人工智能能否维护人权?
IF 3.3 3区 社会学
Computer Law & Security Review Pub Date : 2024-09-16 DOI: 10.1016/j.clsr.2024.106051
{"title":"Resettlement by algorithm: Can artificial intelligence uphold human rights?","authors":"","doi":"10.1016/j.clsr.2024.106051","DOIUrl":"10.1016/j.clsr.2024.106051","url":null,"abstract":"<div><p>This article focuses on the potential use of artificial intelligence (AI) in the resettlement of refugees and its implications for their fundamental rights. Resettlement is the process of selecting refugees and transferring them to a third country that agrees to admit them permanently. While AI has the potential to improve efficiency and effectiveness in resettlement processes, such as matching refugees with suitable resettlement countries and places, it also poses various risks and raises concerns about human rights violations. The article examines the current and potential uses of AI throughout the resettlement process, including the selection and referral of refugees for resettlement and the facilitation and improvement of integration. The article then analyses the potential impact of AI on fundamental rights. The article concludes by arguing for a cautious approach to using AI in resettlement processes. It emphasises that the use of AI in assessing refugee inclusion and exclusion for resettlement, as well as matching them with different resettlement states, could conflict with fundamental rights. This raises concerns about transparency, explainability, accountability, effective remedies, data protection, and the risk of bias and discrimination.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":null,"pages":null},"PeriodicalIF":3.3,"publicationDate":"2024-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142239458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Contextualizing Personal Information: Privacy's Post-Neoliberal Constitutionalism and Its Heterogeneous Imperfections in China 个人信息的语境化:隐私权的后新自由主义宪政及其在中国的异质性缺陷
IF 3.3 3区 社会学
Computer Law & Security Review Pub Date : 2024-09-14 DOI: 10.1016/j.clsr.2024.106030
{"title":"Contextualizing Personal Information: Privacy's Post-Neoliberal Constitutionalism and Its Heterogeneous Imperfections in China","authors":"","doi":"10.1016/j.clsr.2024.106030","DOIUrl":"10.1016/j.clsr.2024.106030","url":null,"abstract":"<div><p>This article examines the evolutionary trajectory of perceptual diversification concerning Yinsi, privacy, and personal information in China. It elucidates how efforts to integrate privacy within the constitutional framework, a complex undertaking, have resulted in a heterogeneous system. This system forges an economically rational, technologically trustworthy, and socially experimental infrastructure that simultaneously embodies materialist and post-neoliberal characteristics. The study traces the transformation from collectivist and charismatic conceptualization to judicial unevenness arising from the unwritten nature of de-constitutionalized privacy. This evolution ultimately leads to digital incentive compatibility, reflecting a pressure-driven post-neoliberal economic rationale. Personal information with Chinese characteristics represents a normative construct aimed at harmonizing economic liberties and enhancing market efficiency while exemplifying sovereign statecraft of data production relations. The article underscores China's paternalist yet inertial adaptability, manifested in its pursuit of legal and institutional reforms concerning social identity, shaping socio-economic and performance legitimacy structures. Furthermore, the study introduces a tripartite cognitive and infrastructural schema of identifiability, incorporating legal, technological, and social dimensions to highlight the interchangeable roles that the state, private sector, and individuals have played in institutionalizing identities. The inherent complexities of such systems might expose them to market inefficiencies and digital harms, particularly when hierarchical interventions deviate from the original economic intention of data production and circulation. Consequently, the article advocates for elevating privacy constitutionalism to a more explicit and codified status in both legislative and judicial domains. This elevation would confer formal authority to address imbalances and unchecked competing interests in public and private stakeholderism, ultimately striving for a polycentric and proportionate (re-)equilibrium between the normative efficiency of identity infrastructures and the preservation of moral rights in digital China.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":null,"pages":null},"PeriodicalIF":3.3,"publicationDate":"2024-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142233068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Christian perspectives on the regulation of posthumous medical data donation (PMDD): An empirical study 基督教对遗体医学数据捐赠(PMDD)监管的观点:实证研究
IF 3.3 3区 社会学
Computer Law & Security Review Pub Date : 2024-09-11 DOI: 10.1016/j.clsr.2024.106052
{"title":"Christian perspectives on the regulation of posthumous medical data donation (PMDD): An empirical study","authors":"","doi":"10.1016/j.clsr.2024.106052","DOIUrl":"10.1016/j.clsr.2024.106052","url":null,"abstract":"<div><p>This article sets out the results of an empirical study exploring the intersection of religious views and perspectives and the regulation of post-mortem data donation (PMDD), particularly focusing on issues of consent and individual control. Through semi-structured interviews with practicing members of the Christian clergy of the United Kingdom, the study investigated the ethical and practical implications of integrating religious viewpoints into secular debates on data protection and privacy, using PMDD as a use case. The findings revealed a consensus among participants that religious perspectives, including Christian perspectives, can enhance the ethical robustness of PMDD regulatory frameworks by promoting values such as dignity, autonomy, and respect for individual preferences. However, the study also identified a possible gap in the systematic consideration of these views within existing regulatory practices pertaining to data protection and privacy. Pursuant to these findings, the article argues for the adoption of an \"opt-out\" consent mechanism, which balances public health benefits with individual rights, as a pragmatic approach to PMDD regulation. Additionally, the article highlights the potential for religious insights to enrich policy dialogues, ensuring that legal rules relating to data protection and information governance resonate with a broader array of societal values.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":null,"pages":null},"PeriodicalIF":3.3,"publicationDate":"2024-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0267364924001183/pdfft?md5=d29d381aa1608799982b7a99e384820d&pid=1-s2.0-S0267364924001183-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142169522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Metaverse impact on the politics means 元宇宙对政治的影响意味着
IF 3.3 3区 社会学
Computer Law & Security Review Pub Date : 2024-09-10 DOI: 10.1016/j.clsr.2024.106037
{"title":"The Metaverse impact on the politics means","authors":"","doi":"10.1016/j.clsr.2024.106037","DOIUrl":"10.1016/j.clsr.2024.106037","url":null,"abstract":"<div><p>Here, I pose a hypothetical scenario starring the Metaverse arrival in fifteen years. First, I describe this network of networks. Then, I provide some notes on the Metaverse impact on the politics means in the constitutional states, i.e., rule of law, democracy, and human rights. Next, I propose some measures to fit that political means to the Metaverse ecosystem. Hence, they will serve as the basis for the Metaverse regulation in advance and -in turn- they will be useful as a starting point for the academic debate and will enlighten us for the analysis of concepts and institutions that today require reforms because they are not suitable for the regulation of intersubjective conducts in the digital era; e.g., civil liability for damage caused by robotics and autonomous systems, 'unlimited' power of Terms of service imposition by largest internet platforms, real democracy weakness, data and privacy protection by the use of extended reality tools, non-personal data protection.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":null,"pages":null},"PeriodicalIF":3.3,"publicationDate":"2024-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142164725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fair and efficient asylum procedures and artificial intelligence: Quo Vadis due process? 公平高效的庇护程序与人工智能:Quo Vadis due process?
IF 3.3 3区 社会学
Computer Law & Security Review Pub Date : 2024-09-06 DOI: 10.1016/j.clsr.2024.106050
{"title":"Fair and efficient asylum procedures and artificial intelligence: Quo Vadis due process?","authors":"","doi":"10.1016/j.clsr.2024.106050","DOIUrl":"10.1016/j.clsr.2024.106050","url":null,"abstract":"<div><p>In a context of high pressure on national asylum systems and a strive for efficiency, public authorities in Europe are increasingly exploring the potential of artificial intelligence-driven technologies in the asylum process. The use of this technology in the field of asylum is a growing but contentious topic, which raises important normative questions and concerns. In this context, this paper aims to analyse the potential implications for fair asylum procedures when artificial intelligence (AI) assists decision-making. Fair asylum procedures, or due process, are a central condition for guaranteeing the right to asylum and preventing unlawful refoulement, and overall ensuring trust in the asylum adjudication system. After revisiting the theoretical foundations of the concept of fair procedures, this paper develops a normative framework that can guide further reflection on the use of AI in asylum procedures. It thereby analyses the concepts that are key to the debate on the use of AI in decision-making: accuracy, efficiency but also participation. Then, drawing on scholarship in both political science and computer science, it explores potential challenges for the core values of fair procedures, considering both technical and non-technical challenges. This paper concludes that while AI promises efficiency gains for the administration, it identifies important challenges for accuracy and participation. On the basis of these considerations, it highlights the questions that should be asked and answered in order to protect the core values of fair asylum procedures.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":null,"pages":null},"PeriodicalIF":3.3,"publicationDate":"2024-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142149734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
From smart legal contracts to contracts on blockchain: An empirical investigation 从智能法律合同到区块链合同:实证调查
IF 3.3 3区 社会学
Computer Law & Security Review Pub Date : 2024-09-05 DOI: 10.1016/j.clsr.2024.106035
{"title":"From smart legal contracts to contracts on blockchain: An empirical investigation","authors":"","doi":"10.1016/j.clsr.2024.106035","DOIUrl":"10.1016/j.clsr.2024.106035","url":null,"abstract":"<div><p>The issue surrounding the nature and function of smart contracts in the context of legal relationships has garnered significant attention from the European and national legislators, regulatory bodies and legal scholarship. Sections I and II of this essay give an account of the results of the ongoing doctrinal debate, which is not univocal. The objective is to provide an assessment of both the advantages and limitations associated with smart legal contracts. In Section III, the authors introduce a novel negotiation process termed \"contracts on chain\". This process enables parties to engage in negotiations, formalize agreements and execute contracts directly on the blockchain. Consequently, this negotiation approach serves as a potential bridge between the realms of Web 2 and Web 3. Further, it offers a user experience akin to online contracts but benefits from the inherent capabilities of third-generation blockchains. Albeit on-chain contracts can be deployed on both private and public blockchains, the authors express a preference for their use on the public blockchain within a \"logical platform\". This choice allows to enhance regulatory compliance and mitigate the effects of decentralization on liability regimes, while simultaneously optimizing the efficiency gains of public blockchains. Notably, this approach ensures a level of protection commensurate with that offered by private blockchains. The ultimate goal of this innovative process is to streamline the ongoing technological transition and cultivate greater trust within the market for emerging technologies.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":null,"pages":null},"PeriodicalIF":3.3,"publicationDate":"2024-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0267364924001018/pdfft?md5=109b069f1d7ba1afbdf37b76ae1ea0fe&pid=1-s2.0-S0267364924001018-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142149733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
South Africa's Digital Transformation: Understanding the Limits of Traditional Policies and the Potential of Alternative Approaches 南非的数字化转型:了解传统政策的局限性和替代方法的潜力
IF 3.3 3区 社会学
Computer Law & Security Review Pub Date : 2024-09-03 DOI: 10.1016/j.clsr.2024.106011
{"title":"South Africa's Digital Transformation: Understanding the Limits of Traditional Policies and the Potential of Alternative Approaches","authors":"","doi":"10.1016/j.clsr.2024.106011","DOIUrl":"10.1016/j.clsr.2024.106011","url":null,"abstract":"<div><p>This paper analyses the readiness of South African information and communication technology (ICT) infrastructure for the implementation of Fourth Industrial Revolution technologies, which has been highly prioritised by policymakers in recent years. The discussion is centred around examples of smart cities and connectivity. Opportunities have been identified in the form of complimentary bottom-up initiatives. The analysis of the current state of internet access in South Africa, underlying infrastructure and policy developments are essential for understanding the bottlenecks for proceeding with the digital transformation agenda.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":null,"pages":null},"PeriodicalIF":3.3,"publicationDate":"2024-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142129552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信