首页 > 最新文献

Policy Design and Practice最新文献

英文 中文
Preparing for future cyber crises: lessons from governance of the coronavirus pandemic 为未来的网络危机做准备:冠状病毒大流行治理的经验教训
IF 7 Q1 PUBLIC ADMINISTRATION Pub Date : 2023-04-03 DOI: 10.1080/25741292.2023.2205764
G. Mott, Jason R. C. Nurse, Christopher Baker‐Beall
Abstract The SARS-CoV-2 pandemic has had an immense impact on public policy and the management of risks that threaten critical systems, such as national health services. Drawing on perspectives from multiple disciplines, this article considers lessons-learned with respect to mitigating the threats to critical systems and societal harms presented by the proliferation of malware. The article dovetails crisis management with cyber resilience, for the purpose of analyzing transferable good-practices and areas-for-improvement, drawing on preparedness and response strategies deployed in public policymaking in the United Kingdom during the pandemic. Reflecting on key national and local ransomware incidents that have impacted key services, the article offers a post-SARS-CoV-2 review of recent British strategic outputs with respect to cyber resilience; most notably the National Cyber Security Strategy and the Government Cyber Security Strategy. The article focuses on lessons that may be learned with respect to communications strategies. The article argues that although the recent British cyber-security strategies hold significant promise in terms of improving preparedness, response and recovery in relation to future cyber crisis, nuanced, dynamic and empathetic multi-stakeholder engagement will be required in order to meaningfully implement the measures outlined in the strategy documents.
SARS-CoV-2大流行对公共政策和风险管理产生了巨大影响,威胁到国家卫生服务等关键系统。本文从多个学科的角度出发,考虑了减轻恶意软件扩散对关键系统的威胁和社会危害方面的经验教训。本文将危机管理与网络复原力相结合,目的是分析可转移的良好做法和需要改进的领域,并借鉴大流行期间联合王国公共决策中部署的防范和应对战略。本文回顾了影响关键服务的重要国家和地方勒索软件事件,回顾了sars - cov -2后英国最近在网络弹性方面的战略产出;尤其是《国家网络安全战略》和《政府网络安全战略》。本文的重点是在通信策略方面可以吸取的经验教训。文章认为,尽管最近的英国网络安全战略在改善与未来网络危机相关的准备、响应和恢复方面有着重大的承诺,但为了有意义地实施战略文件中概述的措施,需要细致入微、动态和移情的多利益相关者参与。
{"title":"Preparing for future cyber crises: lessons from governance of the coronavirus pandemic","authors":"G. Mott, Jason R. C. Nurse, Christopher Baker‐Beall","doi":"10.1080/25741292.2023.2205764","DOIUrl":"https://doi.org/10.1080/25741292.2023.2205764","url":null,"abstract":"Abstract The SARS-CoV-2 pandemic has had an immense impact on public policy and the management of risks that threaten critical systems, such as national health services. Drawing on perspectives from multiple disciplines, this article considers lessons-learned with respect to mitigating the threats to critical systems and societal harms presented by the proliferation of malware. The article dovetails crisis management with cyber resilience, for the purpose of analyzing transferable good-practices and areas-for-improvement, drawing on preparedness and response strategies deployed in public policymaking in the United Kingdom during the pandemic. Reflecting on key national and local ransomware incidents that have impacted key services, the article offers a post-SARS-CoV-2 review of recent British strategic outputs with respect to cyber resilience; most notably the National Cyber Security Strategy and the Government Cyber Security Strategy. The article focuses on lessons that may be learned with respect to communications strategies. The article argues that although the recent British cyber-security strategies hold significant promise in terms of improving preparedness, response and recovery in relation to future cyber crisis, nuanced, dynamic and empathetic multi-stakeholder engagement will be required in order to meaningfully implement the measures outlined in the strategy documents.","PeriodicalId":20397,"journal":{"name":"Policy Design and Practice","volume":"6 1","pages":"160 - 181"},"PeriodicalIF":7.0,"publicationDate":"2023-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41390166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Governing cyber crises: policy lessons from a comparative analysis 治理网络危机:比较分析的政策教训
IF 7 Q1 PUBLIC ADMINISTRATION Pub Date : 2023-04-03 DOI: 10.1080/25741292.2023.2213061
François Delerue, Monica Kaminska
In cyberspace, the notion of crisis is multifaceted. The complexity of cyber crises pertains to the diversity of actors, activities, targets, and effects involved, creating governance challenges. For example, information campaigns on the Internet have created a crisis of trust in political discourse and authority in many democratic societies. A recent ransomware attack by a criminal actor brought the entire nation of Costa Rica to a standstill. Incidents such as the state-sponsored SolarWinds and Microsoft Exchange hack have put pressure on the demarcation line between cyber espionage and disruptive cyber operations. Strategic shifts to more proactive and continuous operations as a method of addressing cyber conflict short of war raise questions about key concepts like sovereignty and breed concerns about crisis escalation. State-sponsored malware is increasingly being found in critical infrastructure and electoral systems. The current armed conflict in Ukraine, which has seen an unprecedented involvement of cyber hacktivist groups and private actors, brings to the fore new difficulties of cyber crisis management for both the belligerents and third states. These ongoing developments in the threat landscape continually shift the goal posts on acceptable state behavior in cyberspace. Despite important strides in cyber policy development by some governments, many strategies are still in the early stages of maturity and provide little guidance for the diversity of cyber crises that can unfold. Moreover, there is much variance in national, regional, and multilateral approaches to what is sometimes called a cyber “wild west” in the international realm, yet these divergences remain understudied. Additionally, states do not always abide by their own policies or the ones agreed internationally, both in their practice of offensive cyber operations and in addressing
在网络空间中,危机的概念是多方面的。网络危机的复杂性与行动者、活动、目标和影响的多样性有关,这给治理带来了挑战。例如,互联网上的信息运动在许多民主社会造成了对政治话语和权威的信任危机。最近一名犯罪分子的勒索软件攻击使整个哥斯达黎加陷入瘫痪。政府支持的太阳风(SolarWinds)和微软交易所(Microsoft Exchange)遭黑客攻击等事件,给网络间谍活动与破坏性网络行动之间的界限带来了压力。作为解决网络冲突的一种方法,战略转向更主动、更持续的行动,引发了对主权等关键概念的质疑,并引发了对危机升级的担忧。国家支持的恶意软件越来越多地出现在关键的基础设施和选举系统中。乌克兰当前的武装冲突前所未有地卷入了网络黑客组织和私人行为体,这给交战双方和第三国都带来了网络危机管理的新困难。这些威胁形势的持续发展不断改变着网络空间中可接受的国家行为的门柱。尽管一些政府在网络政策制定方面取得了重大进展,但许多战略仍处于成熟的早期阶段,对可能出现的网络危机的多样性没有提供多少指导。此外,在国际领域中,国家、地区和多边方法在应对网络“蛮荒西部”方面存在很大差异,但这些差异仍未得到充分研究。此外,各国并不总是遵守自己的政策或国际商定的政策,无论是在进攻性网络行动的实践中还是在解决问题方面
{"title":"Governing cyber crises: policy lessons from a comparative analysis","authors":"François Delerue, Monica Kaminska","doi":"10.1080/25741292.2023.2213061","DOIUrl":"https://doi.org/10.1080/25741292.2023.2213061","url":null,"abstract":"In cyberspace, the notion of crisis is multifaceted. The complexity of cyber crises pertains to the diversity of actors, activities, targets, and effects involved, creating governance challenges. For example, information campaigns on the Internet have created a crisis of trust in political discourse and authority in many democratic societies. A recent ransomware attack by a criminal actor brought the entire nation of Costa Rica to a standstill. Incidents such as the state-sponsored SolarWinds and Microsoft Exchange hack have put pressure on the demarcation line between cyber espionage and disruptive cyber operations. Strategic shifts to more proactive and continuous operations as a method of addressing cyber conflict short of war raise questions about key concepts like sovereignty and breed concerns about crisis escalation. State-sponsored malware is increasingly being found in critical infrastructure and electoral systems. The current armed conflict in Ukraine, which has seen an unprecedented involvement of cyber hacktivist groups and private actors, brings to the fore new difficulties of cyber crisis management for both the belligerents and third states. These ongoing developments in the threat landscape continually shift the goal posts on acceptable state behavior in cyberspace. Despite important strides in cyber policy development by some governments, many strategies are still in the early stages of maturity and provide little guidance for the diversity of cyber crises that can unfold. Moreover, there is much variance in national, regional, and multilateral approaches to what is sometimes called a cyber “wild west” in the international realm, yet these divergences remain understudied. Additionally, states do not always abide by their own policies or the ones agreed internationally, both in their practice of offensive cyber operations and in addressing","PeriodicalId":20397,"journal":{"name":"Policy Design and Practice","volume":"6 1","pages":"127 - 130"},"PeriodicalIF":7.0,"publicationDate":"2023-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48013896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber-attacks and the right of self-defense: a case study of the Netherlands 网络攻击与自卫权——以荷兰为例
IF 7 Q1 PUBLIC ADMINISTRATION Pub Date : 2023-02-22 DOI: 10.1080/25741292.2023.2179955
Ferry Oorsprong, P. Ducheine, P. Pijpers
Abstract Whilst Article 51 of the UN Charter as a rule indicates that an “armed attack” may trigger a State’s right of self-defense, the actual purport of armed attack remains a matter of interpretation and qualification. To improve the notion of the rule on self-defense and contribute to the jus ad bellum, more clarification as to what constitutes an armed attack in cyberspace is necessary. Therefore, policy norms—regarding when cyber-attacks reach the threshold of an armed attack—could guide State behavior. On the one hand, these policy norms could be used in the political decision-making processes for States that consider initiating cyber-attacks. On the other, they could help victim States in their decision-making processes in response to grave cyber-attacks. The aim of the paper is to propose a tangible guideline that outlines when cyber-attacks—perpetrated solely in or through cyberspace and not in conjunction with conventional military attacks—can qualify as an armed attack. By assessing the positions of States and leading academic opinions regarding the qualification of cyber-attacks as armed attacks, and applying international and interdisciplinary policy documents to transfer the legal debate into tangible options, a policy framework is deduced that can serve as a baseline for international cyber norms. This framework distinguishes three separate categories of armed attack in cyberspace, each with their own distinctive levels to determine when a cyber-attack can qualify as an armed attack. These absolute levels are tailored for the Netherlands but could also be suitable for other States when transferred to percentages of the gross national/domestic product and the population size.
摘要虽然《联合国宪章》第五十一条一般规定“武装攻击”可触发国家的自卫权,但武装攻击的实际意义仍然是一个解释和限定问题。为了完善自卫规则的概念,并有助于维护战争法,有必要进一步澄清网络空间中的武装攻击的构成。因此,政策规范——关于网络攻击何时达到武装攻击的阈值——可以指导国家行为。一方面,这些政策规范可用于考虑发起网络攻击的国家的政治决策过程。另一方面,它们可以帮助受害国在应对严重网络攻击的决策过程中发挥作用。该文件的目的是提出一个切实可行的指导方针,概述何时网络攻击——仅在网络空间或通过网络空间实施,而不与常规军事攻击相结合——可以被视为武装攻击。通过评估各国关于网络攻击为武装攻击资格的立场和主要学术意见,并应用国际和跨学科政策文件将法律辩论转化为切实可行的选择,推断出一个政策框架,可作为国际网络规范的基线。该框架将网络空间中的武装攻击区分为三种不同的类别,每种类别都有其独特的级别,以确定何时网络攻击可以被视为武装攻击。这些绝对水平是为荷兰量身定制的,但如果换算成国民生产总值/国内生产总值和人口规模的百分比,也可能适用于其他国家。
{"title":"Cyber-attacks and the right of self-defense: a case study of the Netherlands","authors":"Ferry Oorsprong, P. Ducheine, P. Pijpers","doi":"10.1080/25741292.2023.2179955","DOIUrl":"https://doi.org/10.1080/25741292.2023.2179955","url":null,"abstract":"Abstract Whilst Article 51 of the UN Charter as a rule indicates that an “armed attack” may trigger a State’s right of self-defense, the actual purport of armed attack remains a matter of interpretation and qualification. To improve the notion of the rule on self-defense and contribute to the jus ad bellum, more clarification as to what constitutes an armed attack in cyberspace is necessary. Therefore, policy norms—regarding when cyber-attacks reach the threshold of an armed attack—could guide State behavior. On the one hand, these policy norms could be used in the political decision-making processes for States that consider initiating cyber-attacks. On the other, they could help victim States in their decision-making processes in response to grave cyber-attacks. The aim of the paper is to propose a tangible guideline that outlines when cyber-attacks—perpetrated solely in or through cyberspace and not in conjunction with conventional military attacks—can qualify as an armed attack. By assessing the positions of States and leading academic opinions regarding the qualification of cyber-attacks as armed attacks, and applying international and interdisciplinary policy documents to transfer the legal debate into tangible options, a policy framework is deduced that can serve as a baseline for international cyber norms. This framework distinguishes three separate categories of armed attack in cyberspace, each with their own distinctive levels to determine when a cyber-attack can qualify as an armed attack. These absolute levels are tailored for the Netherlands but could also be suitable for other States when transferred to percentages of the gross national/domestic product and the population size.","PeriodicalId":20397,"journal":{"name":"Policy Design and Practice","volume":"6 1","pages":"217 - 239"},"PeriodicalIF":7.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43244924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Great power narratives on the challenges of cyber norm building 大国对网络规范构建挑战的叙述
IF 7 Q1 PUBLIC ADMINISTRATION Pub Date : 2023-02-08 DOI: 10.1080/25741292.2023.2175995
Mischa Hansel
Abstract States, companies and civil society actors broadly agree that ICT misuse needs to be prevented through effective international policies and regulatory efforts. However, corresponding norm-building processes have been repeatedly characterized by setbacks and controversies regarding interpretations. Whenever such a situation has arisen, state representatives quickly engaged in intense storytelling, accusing their counterparts of seeking to impose “the law of the jungle” or of following hidden policy agendas at the UN. This paper focusses on the stories state representatives use to explain the international community’s recurrent failures, such as arms races, crisis escalations or destructive criminal acts. Using narrative concepts and methods, the analysis explores the dynamics of this emerging transnational public diplomacy, focusing on Russia and the United States in particular. Beyond comparing main structural elements of each narrative, the goal is to elucidate legitimization strategies and dilemmas, resulting in several policy implications. For example, United States representatives and allies need to make specific and concise references to UN cyber norms during public attributions, lest they could play into the hands of a counter-narrative of Western domination and hypocrisy.
国家、企业和民间社会行为体普遍认为,需要通过有效的国际政策和监管努力来防止信息通信技术滥用。然而,相应的规范建立进程一再出现关于解释的挫折和争议。每当出现这种情况时,各国代表就会迅速展开激烈的叙事,指责他们的同行试图强加“弱肉强食的法则”,或在联合国遵循隐蔽的政策议程。本文的重点是国家代表用来解释国际社会经常性失败的故事,如军备竞赛、危机升级或破坏性犯罪行为。运用叙事概念和方法,分析探讨了这种新兴的跨国公共外交的动态,特别关注俄罗斯和美国。除了比较每种叙述的主要结构要素之外,目标是阐明合法化策略和困境,从而产生若干政策影响。例如,美国的代表和盟友需要在公开归属时具体而简洁地提到联合国的网络规范,以免他们会被西方统治和虚伪的反叙述所利用。
{"title":"Great power narratives on the challenges of cyber norm building","authors":"Mischa Hansel","doi":"10.1080/25741292.2023.2175995","DOIUrl":"https://doi.org/10.1080/25741292.2023.2175995","url":null,"abstract":"Abstract States, companies and civil society actors broadly agree that ICT misuse needs to be prevented through effective international policies and regulatory efforts. However, corresponding norm-building processes have been repeatedly characterized by setbacks and controversies regarding interpretations. Whenever such a situation has arisen, state representatives quickly engaged in intense storytelling, accusing their counterparts of seeking to impose “the law of the jungle” or of following hidden policy agendas at the UN. This paper focusses on the stories state representatives use to explain the international community’s recurrent failures, such as arms races, crisis escalations or destructive criminal acts. Using narrative concepts and methods, the analysis explores the dynamics of this emerging transnational public diplomacy, focusing on Russia and the United States in particular. Beyond comparing main structural elements of each narrative, the goal is to elucidate legitimization strategies and dilemmas, resulting in several policy implications. For example, United States representatives and allies need to make specific and concise references to UN cyber norms during public attributions, lest they could play into the hands of a counter-narrative of Western domination and hypocrisy.","PeriodicalId":20397,"journal":{"name":"Policy Design and Practice","volume":"6 1","pages":"182 - 197"},"PeriodicalIF":7.0,"publicationDate":"2023-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44341826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Keep walking on the bright side: criticality, credit and challenge 保持光明的一面:关键性、信誉和挑战
IF 7 Q1 PUBLIC ADMINISTRATION Pub Date : 2023-01-23 DOI: 10.1080/25741292.2023.2169982
M. Flinders
Abstract In a recent article in this journal Mark van Ostaijen and Shivant Jhagroe (O&J) provided a highly critical analysis of Positive Public Administration (PPA). “[It] will not create a way out” they argued “but only a new way into traditional and intellectual problems that have haunted PA as a discipline” and was nothing more than “a rather romantic, nostalgic, and regressive turn to the past and the inability to actually innovate public administration as a field.” This response article argues that although O&J were correct to highlight the risk of co-option and the importance of criticality they are wrong to assume that PPA is for some reason unable to identify or cope with such pressures. By returning to PPA’s core emphasis on the interplay between levels of policy in the interpretation of policy success a multi-levelled framework is provided. This illustrates that the concurrent identification of “success-within-failure” (or vice versa) is possible and therefore identifying successful policy need not be uncritical. As such, PPA need not necessarily be associated with conservative, instrumental, system-affirming thinking in the way O&J assume. “Making public administration again” demands that its adherents hone the ability to range across different policy levels in ways that allow them to avoid the zero-sum trap that O&J identify (but then themselves fall into).
摘要在本杂志最近的一篇文章中,Mark van Ostaijen和Shivant Jharoe(O&J)对积极公共管理(PPA)进行了高度批判性的分析。“(它)不会创造一条出路”,他们认为,“而只是一条进入传统和知识问题的新途径,这些问题一直困扰着PA作为一门学科”,只不过是“对过去的一种相当浪漫、怀旧和倒退的转向,以及无法真正创新公共行政作为一个领域。”。“这篇回应文章认为,尽管O&J强调共同选择的风险和关键性的重要性是正确的,但他们认为PPA由于某种原因无法识别或应对这种压力是错误的。通过回到PPA在解释政策成功时对政策层面之间相互作用的核心强调,提供了一个多层面的框架。这表明,同时识别“失败中的成功”(反之亦然)是可能的,因此识别成功的策略不必不加批判。因此,PPA不必像O&J假设的那样,与保守的、工具性的、肯定系统的思维联系在一起。“重新制定公共行政”要求其追随者磨练跨不同政策级别的能力,使他们能够避免O&J确定的零和陷阱(但随后他们自己也陷入了)。
{"title":"Keep walking on the bright side: criticality, credit and challenge","authors":"M. Flinders","doi":"10.1080/25741292.2023.2169982","DOIUrl":"https://doi.org/10.1080/25741292.2023.2169982","url":null,"abstract":"Abstract In a recent article in this journal Mark van Ostaijen and Shivant Jhagroe (O&J) provided a highly critical analysis of Positive Public Administration (PPA). “[It] will not create a way out” they argued “but only a new way into traditional and intellectual problems that have haunted PA as a discipline” and was nothing more than “a rather romantic, nostalgic, and regressive turn to the past and the inability to actually innovate public administration as a field.” This response article argues that although O&J were correct to highlight the risk of co-option and the importance of criticality they are wrong to assume that PPA is for some reason unable to identify or cope with such pressures. By returning to PPA’s core emphasis on the interplay between levels of policy in the interpretation of policy success a multi-levelled framework is provided. This illustrates that the concurrent identification of “success-within-failure” (or vice versa) is possible and therefore identifying successful policy need not be uncritical. As such, PPA need not necessarily be associated with conservative, instrumental, system-affirming thinking in the way O&J assume. “Making public administration again” demands that its adherents hone the ability to range across different policy levels in ways that allow them to avoid the zero-sum trap that O&J identify (but then themselves fall into).","PeriodicalId":20397,"journal":{"name":"Policy Design and Practice","volume":"6 1","pages":"381 - 388"},"PeriodicalIF":7.0,"publicationDate":"2023-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43819160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Designing governance and policy for disruptive digital technologies 为颠覆性数字技术设计治理和政策
IF 7 Q1 PUBLIC ADMINISTRATION Pub Date : 2023-01-02 DOI: 10.1080/25741292.2022.2162241
Fernando Filgueiras, Anjanette Raymond
Abstract The last decade has witnessed a debate about the disruptive role of emerging digital technologies. At the heart of this debate is the issue of big data, which underpins the operations of these digital technologies but creates a series of new risks and issues for society and governments. New policy problems concerning data require formulators of new governance strategies and innovative policy designs. In this introduction to the special issue Data Policy and Governance, we examine scholarship on data governance and data policy, with a particular focus on emerging contributions on these topics. We also present the six articles that make up this special issue and indicate trends and future research directions from the discussion. This review demonstrates how data governance and policy are central to the digital world and require new designs and dynamics to deal with instruments, mixes, practices, and regulatory mechanisms.
在过去的十年里,人们对新兴数字技术的颠覆性作用进行了辩论。这场辩论的核心是大数据问题,大数据支撑着这些数字技术的运作,但也给社会和政府带来了一系列新的风险和问题。有关数据的新政策问题需要制定新的治理战略和创新的政策设计。在这篇特刊《数据政策与治理》的引言中,我们研究了数据治理和数据政策方面的学术研究,特别关注了这些主题的新贡献。我们还将介绍组成本期特刊的六篇文章,并从讨论中指出趋势和未来的研究方向。这篇综述展示了数据治理和政策如何成为数字世界的核心,需要新的设计和动态来处理工具、组合、实践和监管机制。
{"title":"Designing governance and policy for disruptive digital technologies","authors":"Fernando Filgueiras, Anjanette Raymond","doi":"10.1080/25741292.2022.2162241","DOIUrl":"https://doi.org/10.1080/25741292.2022.2162241","url":null,"abstract":"Abstract The last decade has witnessed a debate about the disruptive role of emerging digital technologies. At the heart of this debate is the issue of big data, which underpins the operations of these digital technologies but creates a series of new risks and issues for society and governments. New policy problems concerning data require formulators of new governance strategies and innovative policy designs. In this introduction to the special issue Data Policy and Governance, we examine scholarship on data governance and data policy, with a particular focus on emerging contributions on these topics. We also present the six articles that make up this special issue and indicate trends and future research directions from the discussion. This review demonstrates how data governance and policy are central to the digital world and require new designs and dynamics to deal with instruments, mixes, practices, and regulatory mechanisms.","PeriodicalId":20397,"journal":{"name":"Policy Design and Practice","volume":"6 1","pages":"1 - 13"},"PeriodicalIF":7.0,"publicationDate":"2023-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43417541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adoption of digital technologies amidst COVID-19 and privacy breach in India and Bangladesh 印度和孟加拉国在2019冠状病毒病和侵犯隐私的情况下采用数字技术
IF 7 Q1 PUBLIC ADMINISTRATION Pub Date : 2023-01-02 DOI: 10.1080/25741292.2022.2162255
M. Babbar, S. Agrawal, Dilshad Hossain, M. M. Husain
Abstract This article problematizes the institutional void caused by the lack of accountable digital regulation in India and Bangladesh regarding the adoption of public health-related digital technologies during the COVID-19 pandemic. Findings from literature review and preliminary interviews illustrate an emerged pattern in these countries that intersect governmentality and materiality with an absence of oversight. The findings further indicate an absence of privacy laws that leave citizens vulnerable to privacy breach. As surveillance becomes a social norm, authorities appear to turn a blind eye toward human rights while public remain unaware and uninformed. The article recommends that consumer-centric governmentality is needed to ensure the privacy and protection of consumers and citizens in India and Bangladesh.
本文提出了在2019冠状病毒病大流行期间,印度和孟加拉国在采用与公共卫生相关的数字技术方面缺乏负责任的数字监管所造成的制度空白问题。文献综述和初步访谈的结果表明,在这些国家出现了一种模式,即治理和重要性与缺乏监督交织在一起。调查结果进一步表明,隐私法的缺失使公民的隐私容易受到侵犯。随着监视成为一种社会规范,当局似乎对人权视而不见,而公众却不知情。这篇文章建议,印度和孟加拉国需要以消费者为中心的治理,以确保消费者和公民的隐私和保护。
{"title":"Adoption of digital technologies amidst COVID-19 and privacy breach in India and Bangladesh","authors":"M. Babbar, S. Agrawal, Dilshad Hossain, M. M. Husain","doi":"10.1080/25741292.2022.2162255","DOIUrl":"https://doi.org/10.1080/25741292.2022.2162255","url":null,"abstract":"Abstract This article problematizes the institutional void caused by the lack of accountable digital regulation in India and Bangladesh regarding the adoption of public health-related digital technologies during the COVID-19 pandemic. Findings from literature review and preliminary interviews illustrate an emerged pattern in these countries that intersect governmentality and materiality with an absence of oversight. The findings further indicate an absence of privacy laws that leave citizens vulnerable to privacy breach. As surveillance becomes a social norm, authorities appear to turn a blind eye toward human rights while public remain unaware and uninformed. The article recommends that consumer-centric governmentality is needed to ensure the privacy and protection of consumers and citizens in India and Bangladesh.","PeriodicalId":20397,"journal":{"name":"Policy Design and Practice","volume":"6 1","pages":"103 - 125"},"PeriodicalIF":7.0,"publicationDate":"2023-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44897173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The state’s role in governing artificial intelligence: development, control, and promotion through national strategies 国家在管理人工智能方面的作用:通过国家战略进行开发、控制和推广
IF 7 Q1 PUBLIC ADMINISTRATION Pub Date : 2023-01-02 DOI: 10.1080/25741292.2022.2162252
G. Papyshev, Masaru Yarime
Abstract Numerous governments worldwide have issued national artificial intelligence (AI) strategies in the last five years to deal with the opportunities and challenges posed by this technology. However, a systematic understanding of the roles and functions that the governments are taking is lacking in the academic literature. Therefore, this research uses qualitative content analysis and Latent Dirichlet Allocation (LDA) topic modeling methodologies to investigate the texts of 31 strategies from across the globe. The findings of the qualitative content analysis highlight thirteen functions of the state, which include human capital, ethics, R&D, regulation, data, private sector support, public sector applications, diffusion and awareness, digital infrastructure, national security, national challenges, international cooperation, and financial support. We combine these functions into three general themes, representing the state’s role: development, control, and promotion. LDA topic modeling results are also reflective of these themes. Each general theme is present in every national strategy’s text, but the proportion they occupy in the text is different. The combined typology based on two methods reveals that the countries from the post-soviet bloc and East Asia prioritize the theme “development,” highlighting the high level of the state’s involvement in AI innovation. The countries from the EU focus on “control,” which reflects the union’s hard stance on AI regulation, whereas countries like the UK, the US, and Ireland emphasize a more hands-off governance arrangement with the leading role of the private sector by prioritizing “promotion.”
摘要在过去五年中,世界各地的许多政府都发布了国家人工智能战略,以应对这项技术带来的机遇和挑战。然而,学术文献中缺乏对政府所扮演的角色和职能的系统理解。因此,本研究使用定性内容分析和潜在狄利克雷分配(LDA)主题建模方法来调查来自全球的31种策略的文本。定性内容分析的结果突出了国家的十三项职能,包括人力资本、道德、研发、监管、数据、私营部门支持、公共部门应用、传播和意识、数字基础设施、国家安全、国家挑战、国际合作和金融支持。我们将这些职能合并为三个主题,代表国家的作用:发展、控制和促进。LDA主题建模结果也反映了这些主题。每一个总的主题都出现在每一个国家战略的文本中,但它们在文本中所占的比例不同。基于两种方法的组合类型显示,后苏联集团和东亚国家优先考虑“发展”主题,突出了国家对人工智能创新的高度参与。欧盟国家专注于“控制”,这反映了欧盟在人工智能监管方面的强硬立场,而英国、美国和爱尔兰等国则通过优先考虑“促进”,强调由私营部门主导的更为宽松的治理安排
{"title":"The state’s role in governing artificial intelligence: development, control, and promotion through national strategies","authors":"G. Papyshev, Masaru Yarime","doi":"10.1080/25741292.2022.2162252","DOIUrl":"https://doi.org/10.1080/25741292.2022.2162252","url":null,"abstract":"Abstract Numerous governments worldwide have issued national artificial intelligence (AI) strategies in the last five years to deal with the opportunities and challenges posed by this technology. However, a systematic understanding of the roles and functions that the governments are taking is lacking in the academic literature. Therefore, this research uses qualitative content analysis and Latent Dirichlet Allocation (LDA) topic modeling methodologies to investigate the texts of 31 strategies from across the globe. The findings of the qualitative content analysis highlight thirteen functions of the state, which include human capital, ethics, R&D, regulation, data, private sector support, public sector applications, diffusion and awareness, digital infrastructure, national security, national challenges, international cooperation, and financial support. We combine these functions into three general themes, representing the state’s role: development, control, and promotion. LDA topic modeling results are also reflective of these themes. Each general theme is present in every national strategy’s text, but the proportion they occupy in the text is different. The combined typology based on two methods reveals that the countries from the post-soviet bloc and East Asia prioritize the theme “development,” highlighting the high level of the state’s involvement in AI innovation. The countries from the EU focus on “control,” which reflects the union’s hard stance on AI regulation, whereas countries like the UK, the US, and Ireland emphasize a more hands-off governance arrangement with the leading role of the private sector by prioritizing “promotion.”","PeriodicalId":20397,"journal":{"name":"Policy Design and Practice","volume":"6 1","pages":"79 - 102"},"PeriodicalIF":7.0,"publicationDate":"2023-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47689965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Policy designs for adaptive governance of disruptive technologies: the case of facial recognition technology (FRT) in China 颠覆性技术适应性治理的政策设计——以中国面部识别技术为例
IF 7 Q1 PUBLIC ADMINISTRATION Pub Date : 2023-01-02 DOI: 10.1080/25741292.2022.2162248
Zhizhao Li, Yuqing Guo, Masaru Yarime, Xun Wu
Abstract Recent regulations introduced by the Chinese government regarding big data technologies are welcome to those long concerned about the risks associated with their rapid deployment. However, these changes are not sufficient to safeguard privacy and data security. More importantly, these policies may not have fully accounted for the disruptive nature of these technologies. In this paper, we examine the need and the potential of new approaches in policy design regarding disruptive technologies by examining the case of facial recognition technology (FRT) in China. We argue that adaptive governance provides a useful framework for future policy design. Regulatory sandbox approach, policy mix and stakeholder engagement are among key policy measures to overcome regulatory challenges.
摘要中国政府最近出台的关于大数据技术的法规,欢迎那些长期担心其快速部署风险的人。然而,这些更改不足以保护隐私和数据安全。更重要的是,这些政策可能没有充分考虑到这些技术的破坏性。在本文中,我们通过考察面部识别技术(FRT)在中国的案例,考察了颠覆性技术政策设计中新方法的必要性和潜力。我们认为,适应性治理为未来的政策设计提供了一个有用的框架。监管沙盒方法、政策组合和利益相关者参与是克服监管挑战的关键政策措施。
{"title":"Policy designs for adaptive governance of disruptive technologies: the case of facial recognition technology (FRT) in China","authors":"Zhizhao Li, Yuqing Guo, Masaru Yarime, Xun Wu","doi":"10.1080/25741292.2022.2162248","DOIUrl":"https://doi.org/10.1080/25741292.2022.2162248","url":null,"abstract":"Abstract Recent regulations introduced by the Chinese government regarding big data technologies are welcome to those long concerned about the risks associated with their rapid deployment. However, these changes are not sufficient to safeguard privacy and data security. More importantly, these policies may not have fully accounted for the disruptive nature of these technologies. In this paper, we examine the need and the potential of new approaches in policy design regarding disruptive technologies by examining the case of facial recognition technology (FRT) in China. We argue that adaptive governance provides a useful framework for future policy design. Regulatory sandbox approach, policy mix and stakeholder engagement are among key policy measures to overcome regulatory challenges.","PeriodicalId":20397,"journal":{"name":"Policy Design and Practice","volume":"6 1","pages":"27 - 40"},"PeriodicalIF":7.0,"publicationDate":"2023-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42487417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Data Sharing in Disruptive Technologies: Lessons from Adoption of Autonomous Systems in Singapore 颠覆性技术中的数据共享:新加坡采用自主系统的经验教训
IF 7 Q1 PUBLIC ADMINISTRATION Pub Date : 2023-01-02 DOI: 10.1080/25741292.2022.2162247
S. Tan, Araz Taeihagh, Devyani Pande
Abstract Autonomous systems have been a key segment of disruptive technologies for which data are constantly collected, processed, and shared to enable their operations. The internet of things facilitates the storage and transmission of data and data sharing is vital to power their development. However, privacy, cybersecurity, and trust issues have ramifications that form distinct and unforeseen barriers to sharing data. This paper identifies six types of barriers to data sharing (technical, motivational, economic, political, legal, and ethical), examines strategies to overcome these barriers in different autonomous systems, and proposes recommendations to address them. We traced the steps the Singapore government has taken through regulations and frameworks for autonomous systems to overcome barriers to data sharing. The results suggest specific strategies for autonomous systems as well as generic strategies that apply to a broader set of disruptive technologies. To address technical barriers, data sharing within regulatory sandboxes should be promoted. Promoting public-private collaborations will help in overcoming motivational barriers. Resources and analytical capacity must be ramped up to overcome economic barriers. Advancing comprehensive data sharing guidelines and discretionary privacy laws will help overcome political and legal barriers. Further, enforcement of ethical analysis is necessary for overcoming ethical barriers in data sharing. Insights gained from this study will have implications for other jurisdictions keen to maximize data sharing to increase the potential of disruptive technologies such as autonomous systems in solving urban problems.
摘要自主系统一直是颠覆性技术的一个关键部分,不断收集、处理和共享数据以实现其操作。物联网促进了数据的存储和传输,数据共享对其发展至关重要。然而,隐私、网络安全和信任问题的影响形成了共享数据的明显和不可预见的障碍。本文确定了数据共享的六种障碍(技术、动机、经济、政治、法律和道德),研究了在不同自治系统中克服这些障碍的策略,并提出了解决这些障碍的建议。我们追踪了新加坡政府通过自治系统的法规和框架为克服数据共享障碍所采取的步骤。研究结果提出了自主系统的具体策略以及适用于更广泛的颠覆性技术的通用策略。为了解决技术障碍,应促进监管沙盒内的数据共享。促进公私合作将有助于克服动机障碍。必须增加资源和分析能力,以克服经济障碍。推进全面的数据共享准则和自由裁量的隐私法将有助于克服政治和法律障碍。此外,实施伦理分析对于克服数据共享中的伦理障碍是必要的。从这项研究中获得的见解将对其他热衷于最大限度地实现数据共享的司法管辖区产生影响,以增加自治系统等颠覆性技术在解决城市问题方面的潜力。
{"title":"Data Sharing in Disruptive Technologies: Lessons from Adoption of Autonomous Systems in Singapore","authors":"S. Tan, Araz Taeihagh, Devyani Pande","doi":"10.1080/25741292.2022.2162247","DOIUrl":"https://doi.org/10.1080/25741292.2022.2162247","url":null,"abstract":"Abstract Autonomous systems have been a key segment of disruptive technologies for which data are constantly collected, processed, and shared to enable their operations. The internet of things facilitates the storage and transmission of data and data sharing is vital to power their development. However, privacy, cybersecurity, and trust issues have ramifications that form distinct and unforeseen barriers to sharing data. This paper identifies six types of barriers to data sharing (technical, motivational, economic, political, legal, and ethical), examines strategies to overcome these barriers in different autonomous systems, and proposes recommendations to address them. We traced the steps the Singapore government has taken through regulations and frameworks for autonomous systems to overcome barriers to data sharing. The results suggest specific strategies for autonomous systems as well as generic strategies that apply to a broader set of disruptive technologies. To address technical barriers, data sharing within regulatory sandboxes should be promoted. Promoting public-private collaborations will help in overcoming motivational barriers. Resources and analytical capacity must be ramped up to overcome economic barriers. Advancing comprehensive data sharing guidelines and discretionary privacy laws will help overcome political and legal barriers. Further, enforcement of ethical analysis is necessary for overcoming ethical barriers in data sharing. Insights gained from this study will have implications for other jurisdictions keen to maximize data sharing to increase the potential of disruptive technologies such as autonomous systems in solving urban problems.","PeriodicalId":20397,"journal":{"name":"Policy Design and Practice","volume":"6 1","pages":"57 - 78"},"PeriodicalIF":7.0,"publicationDate":"2023-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46326817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
Policy Design and Practice
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1