Computer Law & Security Review最新文献

筛选
英文 中文
The authenticity crisis 真实性危机
IF 2.9 3区 社会学
Computer Law & Security Review Pub Date : 2024-04-15 DOI: 10.1016/j.clsr.2024.105962
Bart Jacobs
{"title":"The authenticity crisis","authors":"Bart Jacobs","doi":"10.1016/j.clsr.2024.105962","DOIUrl":"https://doi.org/10.1016/j.clsr.2024.105962","url":null,"abstract":"<div><p>Authenticity of information is a term with a clear meaning, not in law, but in the area of information security. There, it involves two aspects, called source-authenticity and message-authenticity; they guarantee certainty about the origin of information, and about its integrity. Authenticity differs from veracity: whether information is true (holds) or not is independent of its authenticity. The authenticity crisis described in the title of this paper refers to the destabilising impact of the lack of authenticity of online information, for instance in fake news. The paper proposes systematic use of digital signatures to guarantee authenticity. A crucial point is that authenticity may be organised via technical means (namely via digital signatures), whereas veracity can not. Authenticity-guarantees make institutions recognisable online and provide people with useful tools for making their own credibility judgements.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":null,"pages":null},"PeriodicalIF":2.9,"publicationDate":"2024-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0267364924000293/pdfft?md5=9bddb65dffd44ebce7817dc2b1276590&pid=1-s2.0-S0267364924000293-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140552200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unpacking AI-enabled border management technologies in Greece: To what extent their development and deployment are transparent and respect data protection rules? 解读希腊的人工智能边境管理技术:这些技术的开发和部署在多大程度上是透明的并遵守数据保护规则?
IF 2.9 3区 社会学
Computer Law & Security Review Pub Date : 2024-04-13 DOI: 10.1016/j.clsr.2024.105967
Eleftherios Chelioudakis
{"title":"Unpacking AI-enabled border management technologies in Greece: To what extent their development and deployment are transparent and respect data protection rules?","authors":"Eleftherios Chelioudakis","doi":"10.1016/j.clsr.2024.105967","DOIUrl":"https://doi.org/10.1016/j.clsr.2024.105967","url":null,"abstract":"<div><p>This article embarks on a comprehensive examination of two research questions. The first question is “What are the AI-enabled applications, which are developed and deployed in Greece in the border management field?”. The goal is to provide to the reader a thorough listing of these technologies, as well as information regarding the companies that develop them, and the EU funding schemes that support them. By investigating this question, the paper assesses whether there exists transparent information regarding the procurement, development, and deployment phases of such AI tools in Greece, with a keen focus on the accessibility of related documents and data to civil society actors.The second question is “To what extent are the development and deployment of these AI-enabled border management applications in compliance with the applicable data protection provisions?”. There the goal is to register the different breaches of data protection provisions when such AI tools are developed and deployed in practice, taking into account the findings of civil society actors that have challenged the lawful use of such applications in accordance with the related national legal framework enforcing Regulation 2016/679 (GDPR) and transposing the Directive 2016/680.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":null,"pages":null},"PeriodicalIF":2.9,"publicationDate":"2024-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140551834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The right to self-determination in the digital platform economy 数字平台经济中的自决权
IF 2.9 3区 社会学
Computer Law & Security Review Pub Date : 2024-04-12 DOI: 10.1016/j.clsr.2024.105964
Giacomo Pisani
{"title":"The right to self-determination in the digital platform economy","authors":"Giacomo Pisani","doi":"10.1016/j.clsr.2024.105964","DOIUrl":"https://doi.org/10.1016/j.clsr.2024.105964","url":null,"abstract":"<div><p>The power wielded by platforms under \"algorithmic governmentality\" threatens people's ability to freely self-determine. The European legislation on privacy and, in particular, the GDPR, provide the data subject with certain rights to exercise their own informational self-determination. However, the individual setting of these rights makes them very limited. I will outline a co-regulation proposal that allows subjects to actively participate in the definition of rules for the platform economy. This would allow subjects to self-determine themselves, while giving adequate representation to the collective interests implied in algorithmic relationships.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":null,"pages":null},"PeriodicalIF":2.9,"publicationDate":"2024-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140548567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Frontex as a hub for surveillance and data sharing: Challenges for data protection and privacy rights 作为监控和数据共享中心的 Frontex:数据保护和隐私权面临的挑战
IF 2.9 3区 社会学
Computer Law & Security Review Pub Date : 2024-04-12 DOI: 10.1016/j.clsr.2024.105963
Shrutika Gandhi
{"title":"Frontex as a hub for surveillance and data sharing: Challenges for data protection and privacy rights","authors":"Shrutika Gandhi","doi":"10.1016/j.clsr.2024.105963","DOIUrl":"https://doi.org/10.1016/j.clsr.2024.105963","url":null,"abstract":"<div><p>The European Border and Coast Guard Agency, more commonly known as Frontex, was established in 2004 with “a view to improving the integrated management of the external borders of the Member States of the European Union.” It was tasked with the responsibility of providing technical support and expertise to Member States in the management of borders. Over the years its mandate has increased considerably through amendments to its legislative framework. This expansion has taken place against a background of serious allegations concerning Frontex's role in violating the fundamental rights of asylum seekers through its involvement in pushback operations – the practice of stopping asylum-seekers and migrants in need of protection at or before they reach the European Union's external border. While Frontex's complicity in pushbacks has been widely examined by academics, its transformation into a major surveillance and data processing hub and its compliance (or lack thereof) with the fundamental rights to privacy and protection of personal data have received limited academic attention.</p><p>This paper traces the evolution of Frontex over the years and fundamental rights implications of the transformation of its role.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":null,"pages":null},"PeriodicalIF":2.9,"publicationDate":"2024-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S026736492400030X/pdfft?md5=1c2063f3c9cfafdaeeb363ab99eb114b&pid=1-s2.0-S026736492400030X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140549418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fairness, AI & recruitment 公平、人工智能与招聘
IF 2.9 3区 社会学
Computer Law & Security Review Pub Date : 2024-04-08 DOI: 10.1016/j.clsr.2024.105966
Carlotta Rigotti, Eduard Fosch-Villaronga
{"title":"Fairness, AI & recruitment","authors":"Carlotta Rigotti,&nbsp;Eduard Fosch-Villaronga","doi":"10.1016/j.clsr.2024.105966","DOIUrl":"https://doi.org/10.1016/j.clsr.2024.105966","url":null,"abstract":"<div><p>The ever-increasing adoption of AI technologies in the hiring landscape to enhance human resources efficiency raises questions about algorithmic decision-making's implications in employment, especially for job applicants, including those at higher risk of social discrimination. Among other concepts, such as transparency and accountability, fairness has become crucial in AI recruitment debates due to the potential reproduction of bias and discrimination that can disproportionately affect certain vulnerable groups. However, the ideals and ambitions of fairness may signify different meanings to various stakeholders. Conceptualizing fairness is critical because it may provide a clear benchmark for evaluating and mitigating biases, ensuring that AI systems do not perpetuate existing imbalances and promote, in this case, equitable opportunities for all candidates in the job market. To this end, in this article, we conduct a scoping literature review on fairness in AI applications for recruitment and selection purposes, with special emphasis on its definition, categorization, and practical implementation. We start by explaining how AI applications have been increasingly used in the hiring process, especially to increase the efficiency of the HR team. We then move to the limitations of this technological innovation, which is known to be at high risk of privacy violations and social discrimination. Against this backdrop, we focus on defining and operationalizing fairness in AI applications for recruitment and selection purposes through cross-disciplinary lenses. Although the applicable legal frameworks and some research currently address the issue piecemeal, we observe and welcome the emergence of some cross-disciplinary efforts aimed at tackling this multifaceted challenge. We conclude the article with some brief recommendations to guide and shape future research and action on the fairness of AI applications in the hiring process for the better.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":null,"pages":null},"PeriodicalIF":2.9,"publicationDate":"2024-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140536319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Do not go gentle into that good night: The European Union's and China's different approaches to the extraterritorial application of artificial intelligence laws and regulations 不要温柔地进入那个良夜:欧盟与中国对人工智能法律法规域外适用的不同态度
IF 2.9 3区 社会学
Computer Law & Security Review Pub Date : 2024-04-04 DOI: 10.1016/j.clsr.2024.105965
Wang Yan
{"title":"Do not go gentle into that good night: The European Union's and China's different approaches to the extraterritorial application of artificial intelligence laws and regulations","authors":"Wang Yan","doi":"10.1016/j.clsr.2024.105965","DOIUrl":"https://doi.org/10.1016/j.clsr.2024.105965","url":null,"abstract":"<div><p>The extraterritorial application of artificial intelligence (AI) laws and regulations is a form of global AI governance. The EU and China serve as two different examples of how to achieve the extraterritorial applicability of AI laws and regulations. The former shows an explicit territorial extension with more trigger factors, whereas the latter shows vertical regulation with a narrower territorial scope. Both countries’ legislative motivations differ but also have some commonalities. One of the primary goals of extraterritorial application of domestic laws is to protect citizens within their territory. The digital economy's characteristics make it necessary for AI laws to have extraterritorial effects. Without international conventions or treaties, there is a legal vacuum in AI regulation. Additionally, the extraterritorial application of AI laws and regulations helps a state become a global standard-setter and gain an international sphere of influence. However, the extraterritorial application of AI laws and regulations sometimes functions as a form of legal imperialism. This exacerbates the injustice between great powers and weak countries in AI competition. To justify the legitimacy of the extraterritorial application of AI laws and regulations, it is beneficial to adopt the ‘inner morality of extraterritoriality’, a theoretical framework proposed by Professor Dan Svantesson. In fact, extraterritorial applicability depends on the market size and attractiveness. For other countries, whether their AI laws and regulations are endowed with extraterritorial effects is their prerogative. However, they should consider their soft power before implementing legislation.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":null,"pages":null},"PeriodicalIF":2.9,"publicationDate":"2024-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140347438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
European National News 欧洲国家新闻
IF 2.9 3区 社会学
Computer Law & Security Review Pub Date : 2024-04-01 DOI: 10.1016/j.clsr.2024.105954
Nick Pantlin
{"title":"European National News","authors":"Nick Pantlin","doi":"10.1016/j.clsr.2024.105954","DOIUrl":"https://doi.org/10.1016/j.clsr.2024.105954","url":null,"abstract":"<div><p>This article tracks developments at the national level in key European countries in the area of IT and communications and provides a concise alerting service of important national developments. It is co-ordinated by Herbert Smith Freehills LLP and contributed to by firms across Europe. This column provides a concise alerting service of important national developments in key European countries. Part of its purpose is to complement the Journal's feature articles and briefing notes by keeping readers abreast of what is currently happening “on the ground” at a national level in implementing EU level legislation and international conventions and treaties. Where an item of European National News is of particular significance, CLSR may also cover it in more detail in the current or a subsequent edition.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":null,"pages":null},"PeriodicalIF":2.9,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140555007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Asia–Pacific developments 亚太地区的发展
IF 2.9 3区 社会学
Computer Law & Security Review Pub Date : 2024-04-01 DOI: 10.1016/j.clsr.2024.105953
Gabriela Kennedy
{"title":"Asia–Pacific developments","authors":"Gabriela Kennedy","doi":"10.1016/j.clsr.2024.105953","DOIUrl":"https://doi.org/10.1016/j.clsr.2024.105953","url":null,"abstract":"<div><p>This column provides a country by country analysis of the latest legal developments, cases and issues relevant to the IT, media and telecommunications' industries in key jurisdictions across the Asia Pacific region. The articles appearing in this column are intended to serve as ‘alerts’ and are not submitted as detailed analyses of cases or legal developments.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":null,"pages":null},"PeriodicalIF":2.9,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140554663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Three pathways for standardisation and ethical disclosure by default under the European Union Artificial Intelligence Act 根据《欧盟人工智能法》默认的标准化和道德披露的三种途径
IF 2.9 3区 社会学
Computer Law & Security Review Pub Date : 2024-03-29 DOI: 10.1016/j.clsr.2024.105957
Johann Laux , Sandra Wachter , Brent Mittelstadt
{"title":"Three pathways for standardisation and ethical disclosure by default under the European Union Artificial Intelligence Act","authors":"Johann Laux ,&nbsp;Sandra Wachter ,&nbsp;Brent Mittelstadt","doi":"10.1016/j.clsr.2024.105957","DOIUrl":"https://doi.org/10.1016/j.clsr.2024.105957","url":null,"abstract":"<div><p>Under its proposed Artificial Intelligence Act (‘AIA’), the European Union seeks to develop harmonised standards involving abstract normative concepts such transparency, fairness, and accountability. Applying such concepts inevitably requires answering hard normative questions. Considering this challenge, we argue that there are three possible pathways for future standardisation under the AIA. First, European standard-setting organisations (‘SSOs’) could answer hard normative questions themselves. This approach would raise concerns about its democratic legitimacy. Standardisation is a technical discourse and tends to exclude non-expert stakeholders and the public at large. Second, instead of passing their own normative judgments, SSOs could track the normative consensus they find available. By analysing the standard-setting history of one major SSO, we show that such consensus tracking has historically been its pathway of choice. If standardisation under the AIA took the same route, we demonstrate how this would lead to a false sense of safety as the process is not infallible. Consensus tracking would furthermore push the need to solve unavoidable normative problems down the line. Instead of regulators, AI developers and/or users could define what, for example, fairness requires. By the institutional design of its AIA, the European Commission would have essentially kicked the ‘AI Ethics’ can down the road. We thus suggest a third pathway which aims to avoid the pitfalls of the previous two: SSOs should create standards which require “ethical disclosure by default.” These standards will specify minimum technical testing, documentation, and public reporting requirements to shift ethical decision-making to local stakeholders and limit provider discretion in answering hard normative questions in the development of AI products and services. Our proposed pathway is about putting the right information in the hands of the people with the legitimacy to make complex normative decisions at a local, context-sensitive level.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":null,"pages":null},"PeriodicalIF":2.9,"publicationDate":"2024-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0267364924000244/pdfft?md5=04b22c11bc630a648f5dc35efe33f508&pid=1-s2.0-S0267364924000244-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140321594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rule of law or not? A critical evaluation of legal responses to cyberterrorism in the UK 法治与否?对英国应对网络恐怖主义的法律措施的批判性评估
IF 2.9 3区 社会学
Computer Law & Security Review Pub Date : 2024-03-29 DOI: 10.1016/j.clsr.2024.105951
Xingxing Wei
{"title":"Rule of law or not? A critical evaluation of legal responses to cyberterrorism in the UK","authors":"Xingxing Wei","doi":"10.1016/j.clsr.2024.105951","DOIUrl":"https://doi.org/10.1016/j.clsr.2024.105951","url":null,"abstract":"<div><p>Currently the UK does not have a specific anti-cyberterrorism law, instead relying on existing anti-terrorism laws to deal with cyberterrorism. This approach raises a number of problems insofar as it can lead to legislative uncertainty and unpredictability, as well as impacting on carrying risks of over-criminalisation, a lack of counterbalance, violation of principles of proportionality and arbitrariness. In light of these problems, this article aims to offer a critical evaluation of the UK’s existing legal responses to cyberterrorism with reference to the rule of law and basic human rights principles, mainly focusing on the vague and overly broad definition of terrorism, a tendency towards criminalising a wide range of terrorism precursor offences online, pre-emptive strategies and aggravated punishment of cyberterrorism. Based on this analysis, the article argues that applying the extension of existing anti-terrorism laws to combat low-risk cyberterrorism activities runs the risk of exacerbating harms to the values of the rule of law.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":null,"pages":null},"PeriodicalIF":2.9,"publicationDate":"2024-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140321566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信