{"title":"解读希腊的人工智能边境管理技术:这些技术的开发和部署在多大程度上是透明的并遵守数据保护规则?","authors":"Eleftherios Chelioudakis","doi":"10.1016/j.clsr.2024.105967","DOIUrl":null,"url":null,"abstract":"<div><p>This article embarks on a comprehensive examination of two research questions. The first question is “What are the AI-enabled applications, which are developed and deployed in Greece in the border management field?”. The goal is to provide to the reader a thorough listing of these technologies, as well as information regarding the companies that develop them, and the EU funding schemes that support them. By investigating this question, the paper assesses whether there exists transparent information regarding the procurement, development, and deployment phases of such AI tools in Greece, with a keen focus on the accessibility of related documents and data to civil society actors.The second question is “To what extent are the development and deployment of these AI-enabled border management applications in compliance with the applicable data protection provisions?”. There the goal is to register the different breaches of data protection provisions when such AI tools are developed and deployed in practice, taking into account the findings of civil society actors that have challenged the lawful use of such applications in accordance with the related national legal framework enforcing Regulation 2016/679 (GDPR) and transposing the Directive 2016/680.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"53 ","pages":"Article 105967"},"PeriodicalIF":3.3000,"publicationDate":"2024-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Unpacking AI-enabled border management technologies in Greece: To what extent their development and deployment are transparent and respect data protection rules?\",\"authors\":\"Eleftherios Chelioudakis\",\"doi\":\"10.1016/j.clsr.2024.105967\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>This article embarks on a comprehensive examination of two research questions. The first question is “What are the AI-enabled applications, which are developed and deployed in Greece in the border management field?”. The goal is to provide to the reader a thorough listing of these technologies, as well as information regarding the companies that develop them, and the EU funding schemes that support them. By investigating this question, the paper assesses whether there exists transparent information regarding the procurement, development, and deployment phases of such AI tools in Greece, with a keen focus on the accessibility of related documents and data to civil society actors.The second question is “To what extent are the development and deployment of these AI-enabled border management applications in compliance with the applicable data protection provisions?”. There the goal is to register the different breaches of data protection provisions when such AI tools are developed and deployed in practice, taking into account the findings of civil society actors that have challenged the lawful use of such applications in accordance with the related national legal framework enforcing Regulation 2016/679 (GDPR) and transposing the Directive 2016/680.</p></div>\",\"PeriodicalId\":51516,\"journal\":{\"name\":\"Computer Law & Security Review\",\"volume\":\"53 \",\"pages\":\"Article 105967\"},\"PeriodicalIF\":3.3000,\"publicationDate\":\"2024-04-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computer Law & Security Review\",\"FirstCategoryId\":\"90\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S0267364924000347\",\"RegionNum\":3,\"RegionCategory\":\"社会学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"LAW\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Law & Security Review","FirstCategoryId":"90","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0267364924000347","RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"LAW","Score":null,"Total":0}
Unpacking AI-enabled border management technologies in Greece: To what extent their development and deployment are transparent and respect data protection rules?
This article embarks on a comprehensive examination of two research questions. The first question is “What are the AI-enabled applications, which are developed and deployed in Greece in the border management field?”. The goal is to provide to the reader a thorough listing of these technologies, as well as information regarding the companies that develop them, and the EU funding schemes that support them. By investigating this question, the paper assesses whether there exists transparent information regarding the procurement, development, and deployment phases of such AI tools in Greece, with a keen focus on the accessibility of related documents and data to civil society actors.The second question is “To what extent are the development and deployment of these AI-enabled border management applications in compliance with the applicable data protection provisions?”. There the goal is to register the different breaches of data protection provisions when such AI tools are developed and deployed in practice, taking into account the findings of civil society actors that have challenged the lawful use of such applications in accordance with the related national legal framework enforcing Regulation 2016/679 (GDPR) and transposing the Directive 2016/680.
期刊介绍:
CLSR publishes refereed academic and practitioner papers on topics such as Web 2.0, IT security, Identity management, ID cards, RFID, interference with privacy, Internet law, telecoms regulation, online broadcasting, intellectual property, software law, e-commerce, outsourcing, data protection, EU policy, freedom of information, computer security and many other topics. In addition it provides a regular update on European Union developments, national news from more than 20 jurisdictions in both Europe and the Pacific Rim. It is looking for papers within the subject area that display good quality legal analysis and new lines of legal thought or policy development that go beyond mere description of the subject area, however accurate that may be.