首页 > 最新文献

Computer Law & Security Review最新文献

英文 中文
Procedural fairness in automated asylum procedures: Fundamental rights for fundamental challenges 自动庇护程序中的程序公正:应对基本挑战的基本权利
IF 3.3 3区 社会学 Q1 LAW Pub Date : 2024-10-17 DOI: 10.1016/j.clsr.2024.106065
In response to the increasing digitalization of asylum procedures, this paper examines the legal challenges surrounding the use of automated tools in refugee status determination (RSD). Focusing on the European Union (EU) context, where interoperable databases and advanced technologies are employed to streamline asylum processes, the paper asks how EU fundamental rights can address the challenges that automation raises. Through a comprehensive analysis of EU law and several real-life cases, the paper focuses on the relationship between procedural fairness and the use of automated tools to provide evidence in RSD. The paper illustrates what standards apply to automated systems based on a legal doctrinal analysis of EU primary and secondary law and emerging case law from national courts and the CJEU. The article contends that the rights to privacy and data protection enhance procedural fairness in asylum procedures and shows how they can be leveraged for increased protection of asylum seekers and refugees. Moreover, the paper also claims that asylum authorities carry a new pivotal responsibility as the medium between the technologies, asylum seekers and their rights.
为应对庇护程序日益数字化的趋势,本文探讨了在难民身份确定(RSD)过程中使用自动化工具所面临的法律挑战。在欧盟(EU)的背景下,可互操作的数据库和先进技术被用于简化庇护程序,本文将重点关注欧盟基本权利如何应对自动化带来的挑战。通过对欧盟法律和几个真实案例的全面分析,本文重点探讨了程序公正与使用自动化工具提供难民身份确定证据之间的关系。本文基于对欧盟主要法律和次要法律以及国家法院和欧盟法院新判例法的法律理论分析,说明了哪些标准适用于自动化系统。文章认为,隐私权和数据保护权增强了庇护程序的程序公正性,并说明了如何利用这些权利加强对寻求庇护者和难民的保护。此外,本文还声称,庇护当局作为技术、寻求庇护者及其权利之间的媒介,承担着新的关键责任。
{"title":"Procedural fairness in automated asylum procedures: Fundamental rights for fundamental challenges","authors":"","doi":"10.1016/j.clsr.2024.106065","DOIUrl":"10.1016/j.clsr.2024.106065","url":null,"abstract":"<div><div>In response to the increasing digitalization of asylum procedures, this paper examines the legal challenges surrounding the use of automated tools in refugee status determination (RSD). Focusing on the European Union (EU) context, where interoperable databases and advanced technologies are employed to streamline asylum processes, the paper asks how EU fundamental rights can address the challenges that automation raises. Through a comprehensive analysis of EU law and several real-life cases, the paper focuses on the relationship between procedural fairness and the use of automated tools to provide evidence in RSD. The paper illustrates what standards apply to automated systems based on a legal doctrinal analysis of EU primary and secondary law and emerging case law from national courts and the CJEU. The article contends that the rights to privacy and data protection enhance procedural fairness in asylum procedures and shows how they can be leveraged for increased protection of asylum seekers and refugees. Moreover, the paper also claims that asylum authorities carry a new pivotal responsibility as the medium between the technologies, asylum seekers and their rights.</div></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":null,"pages":null},"PeriodicalIF":3.3,"publicationDate":"2024-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142444763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Asia-Pacific developments 亚太地区的发展
IF 3.3 3区 社会学 Q1 LAW Pub Date : 2024-10-16 DOI: 10.1016/j.clsr.2024.106058
This column provides a country by country analysis of the latest legal developments, cases and issues relevant to the IT, media and telecommunications' industries in key jurisdictions across the Asia Pacific region. The articles appearing in this column are intended to serve as ‘alerts’ and are not submitted as detailed analyses of cases or legal developments.
本专栏逐国分析亚太地区主要司法管辖区与 IT、媒体和电信行业相关的最新法律发展、案例和问题。本专栏中出现的文章旨在作为 "提醒",而不是作为案件或法律发展的详细分析提交。
{"title":"Asia-Pacific developments","authors":"","doi":"10.1016/j.clsr.2024.106058","DOIUrl":"10.1016/j.clsr.2024.106058","url":null,"abstract":"<div><div>This column provides a country by country analysis of the latest legal developments, cases and issues relevant to the IT, media and telecommunications' industries in key jurisdictions across the Asia Pacific region. The articles appearing in this column are intended to serve as ‘alerts’ and are not submitted as detailed analyses of cases or legal developments.</div></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":null,"pages":null},"PeriodicalIF":3.3,"publicationDate":"2024-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142442602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Infrastructural Brussels Effect: The translation of EU Law into the UK's digital borders 基础设施的布鲁塞尔效应:将欧盟法律转化为英国的数字边界
IF 3.3 3区 社会学 Q1 LAW Pub Date : 2024-10-10 DOI: 10.1016/j.clsr.2024.106057
This article gives an account of the legal standards and safeguards that guide and constrain the current design of the UK's digital borders. Based on an empirical engagement with the development of Cerberus – an advanced risk-based analytics platform aimed at the detection of previously ‘unknown’ threats – the article presents a dual argument. On the one hand, it provides an account of the remaining salience and extraterritorial reach of EU law in setting standards for the collection, retention, processing and sharing of Passenger Name Records (PNR) data in the UK. This PNR data is a constitutive component of the digital border. Through the EU-UK Trade and Cooperation Agreement (TCA), the UK is now bound to comply with the rather stringent legal safeguards developed by the CJEU (in Opinion 1/15) on the retention and automated processing of PNR data. Our analysis shows the different channels through which EU law obtains this extraterritorial reach, how compliance can be monitored and enforced, and, crucially, how it has influenced and constrained the technical design of the UK's digital borders – a salient and unexplored phenomenon that we describe as an Infrastructural Brussels Effect. Yet, on the other hand, the article empirically shows that this is not merely a process of norm diffusion and extraterritoriality. Once legal standards become infrastructurally embedded in Cerberus, we witness normative translations and sociotechnical shifts with important legal and political consequences. Legal standards on ‘reasonable suspicion’ and the ‘objective evidence’ of ‘risk’, we argue, are given specific meaning through a logic of relational inference and algorithmic pattern detection (leading to forms of ‘concern by association’). By studying the entanglements between legal norms and material infrastructures – an approach we describe as infra-legalities – these normative effects become visible and contestable, providing a productive site for the sociolegal study of law and algorithmic governance.
本文阐述了指导和制约英国当前数字边界设计的法律标准和保障措施。Cerberus 是一个先进的基于风险的分析平台,旨在检测以前 "未知 "的威胁。一方面,文章阐述了欧盟法律在为英国旅客姓名记录(PNR)数据的收集、保留、处理和共享制定标准方面仍然具有的显著性和域外影响力。旅客姓名记录数据是数字边界的重要组成部分。通过《欧盟-英国贸易与合作协议》(TCA),英国现在必须遵守欧盟法院(在第 1/15 号意见书中)就旅客姓名记录数据的保留和自动处理制定的相当严格的法律保障措施。我们的分析表明了欧盟法律获得这种治外法权的不同渠道,如何监督和强制欧盟法律的遵守情况,以及最重要的一点,欧盟法律如何影响和制约英国数字边界的技术设计--我们将这一突出且未被探索的现象称为 "基础设施的布鲁塞尔效应"(Infrastructural Brussels Effect)。然而,另一方面,文章通过经验表明,这不仅仅是一个规范传播和治外法权的过程。一旦法律标准在基础架构上嵌入 Cerberus,我们就会看到规范的转换和社会技术的转变,从而产生重要的法律和政治后果。我们认为,关于 "合理怀疑 "和 "风险 "的 "客观证据 "的法律标准,通过关系推理和算法模式检测的逻辑(导致 "连带关注 "的形式)被赋予了特定的含义。通过研究法律规范与物质基础设施之间的纠葛--我们将这种方法称为 "下层法律"(infra-legalities)--这些规范效应变得可见且可争辩,为法律和算法治理的社会法律研究提供了一个富有成效的场所。
{"title":"An Infrastructural Brussels Effect: The translation of EU Law into the UK's digital borders","authors":"","doi":"10.1016/j.clsr.2024.106057","DOIUrl":"10.1016/j.clsr.2024.106057","url":null,"abstract":"<div><div>This article gives an account of the legal standards and safeguards that guide and constrain the current design of the UK's digital borders. Based on an empirical engagement with the development of <em>Cerberus</em> – an advanced risk-based analytics platform aimed at the detection of previously ‘unknown’ threats – the article presents a dual argument. On the one hand, it provides an account of the remaining salience and extraterritorial reach of EU law in setting standards for the collection, retention, processing and sharing of Passenger Name Records (PNR) data in the UK. This PNR data is a constitutive component of the digital border. Through the EU-UK Trade and Cooperation Agreement (TCA), the UK is now bound to comply with the rather stringent legal safeguards developed by the CJEU (in Opinion 1/15) on the retention and automated processing of PNR data. Our analysis shows the different channels through which EU law obtains this extraterritorial reach, how compliance can be monitored and enforced, and, crucially, how it has influenced and constrained the technical design of the UK's digital borders – a salient and unexplored phenomenon that we describe as an <em>Infrastructural Brussels Effect.</em> Yet, on the other hand, the article empirically shows that this is not merely a process of norm diffusion and extraterritoriality. Once legal standards become infrastructurally embedded in Cerberus, we witness normative translations and sociotechnical shifts with important legal and political consequences. Legal standards on ‘reasonable suspicion’ and the ‘objective evidence’ of ‘risk’, we argue, are given specific meaning through a logic of relational inference and algorithmic pattern detection (leading to forms of ‘concern by association’). By studying the entanglements between legal norms and material infrastructures – an approach we describe as infra-legalities – these normative effects become visible and contestable, providing a productive site for the sociolegal study of law and algorithmic governance.</div></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":null,"pages":null},"PeriodicalIF":3.3,"publicationDate":"2024-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142420548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mapping interpretations of the law in online content moderation in Germany 绘制德国在线内容节制方面的法律解释图
IF 3.3 3区 社会学 Q1 LAW Pub Date : 2024-10-09 DOI: 10.1016/j.clsr.2024.106054
Content moderation is a vital condition that online platforms must facilitate, according to the law, to create suitable online environments for their users. By the law, we mean national or European laws that require the removal of content by online platforms, such as EU Regulation 2021/784, which addresses the dissemination of terrorist content online. Content moderation required by these national or European laws, summarised here as ‘the law’, is different from the moderation of pieces of content that is not directly required by law but instead is conducted voluntarily by the platforms. New regulatory requests create an additional layer of complexity of legal grounds for the moderation of content and are relevant to platforms’ daily decisions. The decisions made are either grounded in reasons stemming from different sources of law, such as international or national provisions, or can be based on contractual grounds, such as the platform's Terms of Service and Community Standards. However, how to empirically measure these essential aspects of content moderation remains unclear. Therefore, we ask the following research question: How do online platforms interpret the law when they moderate online content?
To understand this complex interplay and empirically test the quality of a platform's content moderation claims, this article develops a methodology that facilitates empirical evidence of the individual decisions taken per piece of content while highlighting the subjective element of content classification by human moderators. We then apply this methodology to a single empirical case, an anonymous medium-sized German platform that provided us access to their content moderation decisions. With more knowledge of how platforms interpret the law, we can better understand the complex nature of content moderation, its regulation and compliance practices, and to what degree legal moderation might differ from moderation due to contractual reasons in dimensions such as the need for context, information, and time.
Our results show considerable divergence between the platform's interpretation of the law and ours. We believe that a significant number of platform legal interpretations are incorrect due to divergent interpretations of the law and that platforms are removing legal content that they falsely believe to be illegal (‘overblocking’) while simultaneously not moderating illegal content (‘underblocking’). In conclusion, we provide recommendations for content moderation system design that takes (legal) human content moderation into account and creates new methodological ways to test its quality and effect on speech in online platforms.
内容审核是网络平台依法为用户创造合适的网络环境所必须具备的重要条件。我们所说的法律是指要求网络平台删除内容的国家或欧洲法律,如欧盟第 2021/784 号法规,该法规涉及恐怖主义内容的网络传播。这些国家或欧洲法律所要求的内容审核(在此被概括为 "法律")不同于法律没有直接要求,而是由平台自愿进行的内容审核。新的监管要求增加了内容审核法律依据的复杂性,与平台的日常决策息息相关。所做的决定要么基于不同法律来源的理由,如国际或国内规定,要么基于合同理由,如平台的服务条款和社区标准。然而,如何对内容审核的这些重要方面进行实证测量仍不明确。因此,我们提出以下研究问题:为了理解这种复杂的相互作用,并对平台内容审核声明的质量进行实证检验,本文开发了一种方法,便于对每篇内容所做的个别决定进行实证,同时强调了人工审核员对内容分类的主观因素。然后,我们将该方法应用于一个单一的实证案例--一个匿名的中型德国平台,该平台向我们提供了其内容审核决定的访问权限。有了更多关于平台如何解释法律的知识,我们就能更好地理解内容审核的复杂性、其监管和合规实践,以及法律审核在多大程度上可能有别于因合同原因而在上下文、信息和时间需求等方面进行的审核。我们认为,由于对法律的解释存在分歧,大量平台的法律解释是不正确的,平台在删除其误认为是非法的合法内容("过度封禁")的同时,并没有对非法内容进行审核("审核不足")。最后,我们对内容审核系统的设计提出了建议,建议将(合法的)人工内容审核考虑在内,并创建新的方法论途径来测试其质量和对网络平台言论的影响。
{"title":"Mapping interpretations of the law in online content moderation in Germany","authors":"","doi":"10.1016/j.clsr.2024.106054","DOIUrl":"10.1016/j.clsr.2024.106054","url":null,"abstract":"<div><div>Content moderation is a vital condition that online platforms must facilitate, according to the law, to create suitable online environments for their users. By the law, we mean national or European laws that require the removal of content by online platforms, such as EU Regulation 2021/784, which addresses the dissemination of terrorist content online. Content moderation required by these national or European laws, summarised here as ‘the law’, is different from the moderation of pieces of content that is not directly required by law but instead is conducted voluntarily by the platforms. New regulatory requests create an additional layer of complexity of legal grounds for the moderation of content and are relevant to platforms’ daily decisions. The decisions made are either grounded in reasons stemming from different sources of law, such as international or national provisions, or can be based on contractual grounds, such as the platform's Terms of Service and Community Standards. However, how to empirically measure these essential aspects of content moderation remains unclear. Therefore, we ask the following research question: How do online platforms interpret the law when they moderate online content?</div><div>To understand this complex interplay and empirically test the quality of a platform's content moderation claims, this article develops a methodology that facilitates empirical evidence of the individual decisions taken per piece of content while highlighting the subjective element of content classification by human moderators. We then apply this methodology to a single empirical case, an anonymous medium-sized German platform that provided us access to their content moderation decisions. With more knowledge of how platforms interpret the law, we can better understand the complex nature of content moderation, its regulation and compliance practices, and to what degree legal moderation might differ from moderation due to contractual reasons in dimensions such as the need for context, information, and time.</div><div>Our results show considerable divergence between the platform's interpretation of the law and ours. We believe that a significant number of platform legal interpretations are incorrect due to divergent interpretations of the law and that platforms are removing legal content that they falsely believe to be illegal (‘overblocking’) while simultaneously not moderating illegal content (‘underblocking’). In conclusion, we provide recommendations for content moderation system design that takes (legal) human content moderation into account and creates new methodological ways to test its quality and effect on speech in online platforms.</div></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":null,"pages":null},"PeriodicalIF":3.3,"publicationDate":"2024-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142420546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A European right to end-to-end encryption? 欧洲的端到端加密权?
IF 3.3 3区 社会学 Q1 LAW Pub Date : 2024-10-05 DOI: 10.1016/j.clsr.2024.106063
In Podchasov v Russia, the European Court of Human Rights unanimously held that a Russian statutory obligation on ‘internet communications organisers’ to provide information to state authorities that allowed for the decryption of encrypted communications was a disproportionate interference with Article 8 because the available technical means of decryption risked weakening the security of communications for all users of the service. This is significant as authorities in the UK and EU may seek to implement similar statutory obligations on communications service providers.
在 Podchasov 诉俄罗斯一案中,欧洲人权法院一致认为,俄罗斯规定 "互联网通信组织者 "有义务向国家当局提供允许解密加密通信的信息,这是对第 8 条不相称的干涉,因为现有的解密技术手段有可能削弱所有服务用户的通信安全。这一点意义重大,因为英国和欧盟当局可能会寻求对通信服务提供商实施类似的法定义务。
{"title":"A European right to end-to-end encryption?","authors":"","doi":"10.1016/j.clsr.2024.106063","DOIUrl":"10.1016/j.clsr.2024.106063","url":null,"abstract":"<div><div>In <em>Podchasov v Russia</em>, the European Court of Human Rights unanimously held that a Russian statutory obligation on ‘internet communications organisers’ to provide information to state authorities that allowed for the decryption of encrypted communications was a disproportionate interference with Article 8 because the available technical means of decryption risked weakening the security of communications for all users of the service. This is significant as authorities in the UK and EU may seek to implement similar statutory obligations on communications service providers.</div></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":null,"pages":null},"PeriodicalIF":3.3,"publicationDate":"2024-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142420549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Right to Procedural Accuracy: A Governance Model for Digital Evidence in Criminal Proceedings 程序准确性的新权利:刑事诉讼中数字证据的治理模式
IF 3.3 3区 社会学 Q1 LAW Pub Date : 2024-10-04 DOI: 10.1016/j.clsr.2024.106040
This paper motivates and studies the feasibility of a new digital right to procedural accuracy (RPA) for digital evidence processing in criminal investigations. The need to guarantee a new principle of procedural accuracy under Art. 6 of the European Convention on Human Rights (ECHR) is based on the concern that digital forensic science and AI technology have a significant impact on individuals’ rights in criminal proceedings, which are neither coherently nor comprehensively addressed. The personal and material scope of RPA are examined and include: (i) protection against unreliable digital evidence processing; (ii) right to access the chain of evidence, explanation, and forensic assistance; and (iii) the right to participate in the determinative stages of the digital evidence processing. Limitations of the RPA are also discussed.
本文探讨了在刑事调查数字证据处理过程中新的数字程序准确权(RPA)的动机和可行性。根据《欧洲人权公约》(ECHR)第 6 条,有必要保障新的程序准确性原则。欧洲人权公约》(European Convention on Human Rights, ECHR)第 6 条规定的新的程序准确性原则的必要性,是基于对数字法医学和人工智能技术在刑事诉讼中对个人权利产生重大影响的担忧,而这些权利既没有得到连贯一致的处理,也没有得到全面的处理。对 RPA 的个人和物质范围进行了研究,其中包括(i) 防止不可靠的数字证据处理;(ii) 获取证据链、解释和法医协助的权利;(iii) 参与数字证据处理决定性阶段的权利。此外,还讨论了 RPA 的局限性。
{"title":"A New Right to Procedural Accuracy: A Governance Model for Digital Evidence in Criminal Proceedings","authors":"","doi":"10.1016/j.clsr.2024.106040","DOIUrl":"10.1016/j.clsr.2024.106040","url":null,"abstract":"<div><div>This paper motivates and studies the feasibility of a new digital right to procedural accuracy (RPA) for digital evidence processing in criminal investigations. The need to guarantee a new principle of procedural accuracy under Art. 6 of the European Convention on Human Rights (ECHR) is based on the concern that digital forensic science and AI technology have a significant impact on individuals’ rights in criminal proceedings, which are neither coherently nor comprehensively addressed. The personal and material scope of RPA are examined and include: <em>(i)</em> protection against unreliable digital evidence processing; <em>(ii)</em> right to access the chain of evidence, explanation, and forensic assistance; and <em>(iii)</em> the right to participate in the determinative stages of the digital evidence processing. Limitations of the RPA are also discussed.</div></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":null,"pages":null},"PeriodicalIF":3.3,"publicationDate":"2024-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142420621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Who is vulnerable to deceptive design patterns? A transdisciplinary perspective on the multi-dimensional nature of digital vulnerability 谁容易受到欺骗性设计模式的影响?从跨学科角度看数字脆弱性的多面性
IF 3.3 3区 社会学 Q1 LAW Pub Date : 2024-10-04 DOI: 10.1016/j.clsr.2024.106031
In the last few years, there have been growing concerns about the far-reaching influence that digital architectures may exert on individuals and societies. A specific type of digital manipulation is often engineered into the interfaces of digital services through the use of so-called dark patterns, that cause manifold harms against which nobody seems to be immune. However, many areas of law rely on a traditional class-based view according to which certain groups are inherently more vulnerable than others, such as children. Although the undue influence exerted by dark patterns on online decisions can befall anybody, empirical studies show that there are actually certain factors that aggravate the vulnerability of some people by making them more likely to incur in certain manipulation risks engineered in digital services and less resilient to the related harms. But digital vulnerability does not overlap with traditionally protected groups and depends on multifaceted factors. This article contributes to the ongoing discussions on these topics by offering (i) a multidisciplinary mapping of the micro, meso, and macro factors of vulnerability to dark patterns; (ii) a subsequent critical reflection on the feasibility of the risk assessment proposed in three selected EU legal frameworks: the General Data Protection Regulation, the Digital Services Act, and the Artificial Intelligence Act; (iii) and multidisciplinary suggestions to increase resilience towards manipulative designs online.
最近几年,人们越来越关注数字架构可能对个人和社会产生的深远影响。一种特殊的数字操纵往往通过使用所谓的 "黑暗模式"(dark pattern)被设计到数字服务的界面中,造成多方面的伤害,似乎没有人能够幸免。然而,许多法律领域依赖于传统的阶级观点,根据这种观点,某些群体天生就比其他群体更容易受到伤害,比如儿童。尽管黑暗模式对在线决策的不当影响可能会降临到任何人身上,但实证研究表明,实际上有某些因素加剧了某些人的脆弱性,使他们更有可能遭受数字服务中的某些操纵风险,对相关危害的抵御能力也更弱。但数字脆弱性与传统上受保护的群体并不重叠,而是取决于多方面的因素。本文通过提供:(i) 易受黑暗模式影响的微观、中观和宏观因素的多学科图谱;(ii) 随后对三个选定的欧盟法律框架(《通用数据保护条例》、《数字服务法》和《人工智能法》)中提出的风险评估的可行性进行批判性反思;(iii) 以及提高对在线操纵设计的抵御能力的多学科建议,为正在进行的有关这些主题的讨论做出贡献。
{"title":"Who is vulnerable to deceptive design patterns? A transdisciplinary perspective on the multi-dimensional nature of digital vulnerability","authors":"","doi":"10.1016/j.clsr.2024.106031","DOIUrl":"10.1016/j.clsr.2024.106031","url":null,"abstract":"<div><div>In the last few years, there have been growing concerns about the far-reaching influence that digital architectures may exert on individuals and societies. A specific type of digital manipulation is often engineered into the interfaces of digital services through the use of so-called dark patterns, that cause manifold harms against which nobody seems to be immune. However, many areas of law rely on a traditional class-based view according to which certain groups are inherently more vulnerable than others, such as children. Although the undue influence exerted by dark patterns on online decisions can befall anybody, empirical studies show that there are actually certain factors that aggravate the vulnerability of some people by making them more likely to incur in certain manipulation risks engineered in digital services and less resilient to the related harms. But digital vulnerability does not overlap with traditionally protected groups and depends on multifaceted factors. This article contributes to the ongoing discussions on these topics by offering (i) a multidisciplinary mapping of the micro, meso, and macro factors of vulnerability to dark patterns; (ii) a subsequent critical reflection on the feasibility of the risk assessment proposed in three selected EU legal frameworks: the General Data Protection Regulation, the Digital Services Act, and the Artificial Intelligence Act; (iii) and multidisciplinary suggestions to increase resilience towards manipulative designs online.</div></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":null,"pages":null},"PeriodicalIF":3.3,"publicationDate":"2024-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142420547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Conversion of cryptoassets 转换加密资产
IF 3.3 3区 社会学 Q1 LAW Pub Date : 2024-10-02 DOI: 10.1016/j.clsr.2024.106060
It is common for cryptoassets to be stolen, which raises the legal issue of whether cryptoassets can be converted. Under the current law, the tort of conversion applies only to tangibles. Cryptoassets cannot be converted because they are intangible. However, this article argues that it is arbitrary to determine whether cryptoassets are amenable to conversion based on the tangible/intangible distinction. Refusing to extend the tort of conversion to cryptoassets will lead to unfair treatment between cryptoassets and other assets. It will also provide inadequate protection for cryptoassets, which can be interfered with in ways similar to tangibles. This article argues that the tort of conversion should be extended to cryptoassets because they are property capable of possession. A tort for conversion of cryptoassets is established when a defendant has deliberately and exclusively interfered with a claimant's cryptoassets, and the defendant does not have a defence. Since conversion is a tort of strict liability, extending the tort to cryptoassets may create uncertain legal risks to third parties. To protect innocent third parties robustly, five defences should be established: innocent purchaser defence, abandonment, consent, self-help and safe harbour.
加密资产被盗的情况很常见,这就提出了加密资产是否可以转换的法律问题。根据现行法律,转换侵权行为只适用于有形资产。加密资产不能转换,因为它们是无形的。然而,本文认为,根据有形/无形的区别来确定加密资产是否可以转换是武断的。拒绝将转换侵权延伸至加密资产将导致加密资产与其他资产之间的不公平待遇。它还将为加密资产提供不充分的保护,因为加密资产可能会受到与有形资产类似的干扰。本文认为,转换侵权行为应扩展至加密资产,因为它们是能够占有的财产。当被告故意且专门干扰原告的加密资产,且被告没有抗辩理由时,转化加密资产的侵权行为即成立。由于转换是一种严格责任侵权行为,将该侵权行为扩展到加密资产可能会给第三方带来不确定的法律风险。为有力保护无辜第三方,应确立五项抗辩:无辜购买者抗辩、放弃、同意、自助和安全港。
{"title":"Conversion of cryptoassets","authors":"","doi":"10.1016/j.clsr.2024.106060","DOIUrl":"10.1016/j.clsr.2024.106060","url":null,"abstract":"<div><div>It is common for cryptoassets to be stolen, which raises the legal issue of whether cryptoassets can be converted. Under the current law, the tort of conversion applies only to tangibles. Cryptoassets cannot be converted because they are intangible. However, this article argues that it is arbitrary to determine whether cryptoassets are amenable to conversion based on the tangible/intangible distinction. Refusing to extend the tort of conversion to cryptoassets will lead to unfair treatment between cryptoassets and other assets. It will also provide inadequate protection for cryptoassets, which can be interfered with in ways similar to tangibles. This article argues that the tort of conversion should be extended to cryptoassets because they are property capable of possession. A tort for conversion of cryptoassets is established when a defendant has deliberately and exclusively interfered with a claimant's cryptoassets, and the defendant does not have a defence. Since conversion is a tort of strict liability, extending the tort to cryptoassets may create uncertain legal risks to third parties. To protect innocent third parties robustly, five defences should be established: innocent purchaser defence, abandonment, consent, self-help and safe harbour.</div></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":null,"pages":null},"PeriodicalIF":3.3,"publicationDate":"2024-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142420545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Copyright protection during the training stage of generative AI: Industry-oriented U.S. law, rights-oriented EU law, and fair remuneration rights for generative AI training under the UN's international governance regime for AI 生成式人工智能训练阶段的版权保护:以产业为导向的美国法律、以权利为导向的欧盟法律,以及联合国人工智能国际治理制度下生成式人工智能训练的公平报酬权
IF 3.3 3区 社会学 Q1 LAW Pub Date : 2024-10-01 DOI: 10.1016/j.clsr.2024.106056
Generative AI relies on simulating and learning from complex data distributions to automatically generate new, meaningful content from large datasets. Training generative AI models carries the risk of copyright infringement. How can we balance the development of generative AI technology with copyright protection during the training stage of these models? In contrast to existing legal scholarship, this article conducts a comparative study of industry-oriented U.S. copyright law and rights-oriented EU copyright law. It draws insights from the concepts of the tragedy of the commons and the tragedy of the anti-commons, proposing the creation of fair remuneration rights for Generative AI training under the UN's international governance regime for AI. This article offers a typological analysis of potential operational models for fair remuneration rights in Generative AI training, drawing analogies to existing remuneration rights in international copyright treaties. The goal is to provide an open framework for further discussion within the international academic community.
生成式人工智能依靠模拟和学习复杂的数据分布,从大型数据集中自动生成新的、有意义的内容。训练生成式人工智能模型存在侵犯版权的风险。在这些模型的训练阶段,我们如何平衡生成式人工智能技术的发展与版权保护之间的关系?与现有的法律学术研究不同,本文对以产业为导向的美国版权法和以权利为导向的欧盟版权法进行了比较研究。文章从公地悲剧和反公地悲剧的概念中汲取启示,提出在联合国人工智能国际治理制度下为生成式人工智能训练设立公平报酬权。本文通过类比国际版权条约中的现有报酬权,对生成式人工智能培训中公平报酬权的潜在运作模式进行了类型学分析。目的是为国际学术界的进一步讨论提供一个开放的框架。
{"title":"Copyright protection during the training stage of generative AI: Industry-oriented U.S. law, rights-oriented EU law, and fair remuneration rights for generative AI training under the UN's international governance regime for AI","authors":"","doi":"10.1016/j.clsr.2024.106056","DOIUrl":"10.1016/j.clsr.2024.106056","url":null,"abstract":"<div><div>Generative AI relies on simulating and learning from complex data distributions to automatically generate new, meaningful content from large datasets. Training generative AI models carries the risk of copyright infringement. How can we balance the development of generative AI technology with copyright protection during the training stage of these models? In contrast to existing legal scholarship, this article conducts a comparative study of industry-oriented U.S. copyright law and rights-oriented EU copyright law. It draws insights from the concepts of the tragedy of the commons and the tragedy of the anti-commons, proposing the creation of fair remuneration rights for Generative AI training under the UN's international governance regime for AI. This article offers a typological analysis of potential operational models for fair remuneration rights in Generative AI training, drawing analogies to existing remuneration rights in international copyright treaties. The goal is to provide an open framework for further discussion within the international academic community.</div></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":null,"pages":null},"PeriodicalIF":3.3,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142420544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decentralized social networks and the future of free speech online 去中心化社交网络与网络言论自由的未来
IF 3.3 3区 社会学 Q1 LAW Pub Date : 2024-09-30 DOI: 10.1016/j.clsr.2024.106059
Decentralized social networks like Mastodon and BlueSky are trending topics that have drawn much attention and discussion in recent years. By devolving powers from the central node to the end users, decentralized social networks aim to cure existing pathologies on the centralized platforms and have been viewed by many as the future of the Internet. This article critically and systematically assesses the decentralization project's prospect for communications online. It uses normative theories of free speech to examine whether and how the decentralization design could facilitate users’ freedom of expression online. The analysis shows that both promises and pitfalls exist, highlighting the importance of value-based design in this area. Two most salient issues for the design of the decentralized networks are: how to balance the decentralization ideal with constant needs of centralization on the network, and how to empower users to make them truly capable of exercising their control. The article then uses some design examples, such as the shared blocklist and the opt-in search function, to illustrate the value considerations underlying the design choices. Some tentative proposals for law and policy interventions are offered to better facilitate the design of the new network. Rather than providing clear answers, the article seeks to map the value implications of the design choices, highlight the stakes, and point directions for future research.
Mastodon和BlueSky等去中心化社交网络是近年来备受关注和讨论的热门话题。通过将权力从中心节点下放到终端用户,去中心化社交网络旨在治愈中心化平台上的现有病症,并被许多人视为互联网的未来。本文对去中心化项目的网络传播前景进行了批判性和系统性的评估。文章运用言论自由的规范理论,探讨去中心化设计是否以及如何促进用户的网络言论自由。分析表明,该项目既有前景,也有隐患,凸显了以价值为基础的设计在这一领域的重要性。去中心化网络设计的两个最突出的问题是:如何平衡去中心化理想与网络中心化的持续需求,以及如何赋予用户权力,使他们真正有能力行使控制权。文章随后使用了一些设计实例,如共享屏蔽列表和选择搜索功能,来说明设计选择背后的价值考量。文章提出了一些法律和政策干预的初步建议,以更好地促进新网络的设计。文章并没有提供明确的答案,而是试图描绘设计选择的价值影响,强调利害关系,并指出未来研究的方向。
{"title":"Decentralized social networks and the future of free speech online","authors":"","doi":"10.1016/j.clsr.2024.106059","DOIUrl":"10.1016/j.clsr.2024.106059","url":null,"abstract":"<div><div>Decentralized social networks like Mastodon and BlueSky are trending topics that have drawn much attention and discussion in recent years. By devolving powers from the central node to the end users, decentralized social networks aim to cure existing pathologies on the centralized platforms and have been viewed by many as the future of the Internet. This article critically and systematically assesses the decentralization project's prospect for communications online. It uses normative theories of free speech to examine whether and how the decentralization design could facilitate users’ freedom of expression online. The analysis shows that both promises and pitfalls exist, highlighting the importance of value-based design in this area. Two most salient issues for the design of the decentralized networks are: how to balance the decentralization ideal with constant needs of centralization on the network, and how to empower users to make them truly capable of exercising their control. The article then uses some design examples, such as the shared blocklist and the opt-in search function, to illustrate the value considerations underlying the design choices. Some tentative proposals for law and policy interventions are offered to better facilitate the design of the new network. Rather than providing clear answers, the article seeks to map the value implications of the design choices, highlight the stakes, and point directions for future research.</div></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":null,"pages":null},"PeriodicalIF":3.3,"publicationDate":"2024-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142359551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computer Law & Security Review
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1