首页 > 最新文献

Computer Law & Security Review最新文献

英文 中文
Does generative AI copy? Rethinking the right to copy under copyright law
IF 3.3 3区 社会学 Q1 LAW Pub Date : 2024-12-17 DOI: 10.1016/j.clsr.2024.106100
Weijie Huang , Xi Chen
Copyright-regulated reproduction should encompass both technological and economic elements. The technological element, which means the generation of a reproduction, determines whether a certain act constitutes reproduction. The economic element, which means the potential for public distribution and undermining copyright owners’ incentives by the generated reproduction, ascertains whether such an act of reproduction falls within copyright law's jurisdiction. We not only delineate the boundary of copyright-regulated reproduction but also elucidate the underlying rationale for the spectrum of reproduction regulated by presumption, reproduction regulated by exemption, and non-regulated reproduction. Accordingly, we analyze the regulatability of GenAI's reproduction of works throughout its stages. During the data acquisition and preprocessing stages, GenAI engages in reproduction with the technological element but lacks the economic element. During the training and generation stages, GenAI normally does not generate output similar to training data, thus initially lacking the technological element; in exceptional cases where GenAI generates output similar to prior works and possesses the technological element, copyright-regulated reproduction only occurs in the generation stage where the output has the potential for public distribution. Furthermore, we address the possible criticism that GenAI's unregulated reproduction would lead to an inequitable scenario by free riding on preexisting works.
{"title":"Does generative AI copy? Rethinking the right to copy under copyright law","authors":"Weijie Huang ,&nbsp;Xi Chen","doi":"10.1016/j.clsr.2024.106100","DOIUrl":"10.1016/j.clsr.2024.106100","url":null,"abstract":"<div><div>Copyright-regulated reproduction should encompass both technological and economic elements. The technological element, which means the generation of a reproduction, determines whether a certain act constitutes reproduction. The economic element, which means the potential for public distribution and undermining copyright owners’ incentives by the generated reproduction, ascertains whether such an act of reproduction falls within copyright law's jurisdiction. We not only delineate the boundary of copyright-regulated reproduction but also elucidate the underlying rationale for the spectrum of reproduction regulated by presumption, reproduction regulated by exemption, and non-regulated reproduction. Accordingly, we analyze the regulatability of GenAI's reproduction of works throughout its stages. During the data acquisition and preprocessing stages, GenAI engages in reproduction with the technological element but lacks the economic element. During the training and generation stages, GenAI normally does not generate output similar to training data, thus initially lacking the technological element; in exceptional cases where GenAI generates output similar to prior works and possesses the technological element, copyright-regulated reproduction only occurs in the generation stage where the output has the potential for public distribution. Furthermore, we address the possible criticism that GenAI's unregulated reproduction would lead to an inequitable scenario by free riding on preexisting works.</div></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"56 ","pages":"Article 106100"},"PeriodicalIF":3.3,"publicationDate":"2024-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143138759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A model of ‘rough justice’ for internet intermediaries from the perspective of EU copyright law
IF 3.3 3区 社会学 Q1 LAW Pub Date : 2024-12-14 DOI: 10.1016/j.clsr.2024.106094
Thomas Riis
Internet intermediaries’ content moderation raises two major problems. The first relates to the accuracy of the moderation practices, which is an issue on whether the intermediaries over-enforce or under-enforce. The second problem concerns the inherent privatization of justice that results when enforcement of rights is left to a private party. The purpose of the article is to develop a model of ‘rough justice’ for internet intermediaries’ content moderation practices taking into account the obvious fact that such content moderation cannot comply with the degree of justice known from civil procedural law. There is no reason to believe that internet intermediaries strive to achieve the highest level of justice in their content moderation. As a consequence, the model of rough justice presupposes legislative intervention related to 3 different groups of provisions: 1) Procedural rules, 2) substantive rules, and 3) competences of persons involved in content moderation.
{"title":"A model of ‘rough justice’ for internet intermediaries from the perspective of EU copyright law","authors":"Thomas Riis","doi":"10.1016/j.clsr.2024.106094","DOIUrl":"10.1016/j.clsr.2024.106094","url":null,"abstract":"<div><div>Internet intermediaries’ content moderation raises two major problems. The first relates to the accuracy of the moderation practices, which is an issue on whether the intermediaries over-enforce or under-enforce. The second problem concerns the inherent privatization of justice that results when enforcement of rights is left to a private party. The purpose of the article is to develop a model of ‘rough justice’ for internet intermediaries’ content moderation practices taking into account the obvious fact that such content moderation cannot comply with the degree of justice known from civil procedural law. There is no reason to believe that internet intermediaries strive to achieve the highest level of justice in their content moderation. As a consequence, the model of rough justice presupposes legislative intervention related to 3 different groups of provisions: 1) Procedural rules, 2) substantive rules, and 3) competences of persons involved in content moderation.</div></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"56 ","pages":"Article 106094"},"PeriodicalIF":3.3,"publicationDate":"2024-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143138757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The political economy of the fintech regulation in China and its implications
IF 3.3 3区 社会学 Q1 LAW Pub Date : 2024-12-04 DOI: 10.1016/j.clsr.2024.106089
Meihui Zhang , Chi Zhang
Fintech has seen exponential growth in recent years, breaking into markets often underserved by traditional financial services. Along with fintech's benefits, a series of risks caused by fintech has drawn regulators’ attention globally. Fintech activities can be generally categorised into two parts, namely investment-oriented fintech activities such as peer-to-peer lending, equity crowdfunding, and initial coin offerings; the other is payment-oriented fintech, which includes digital payment and central bank digital currencies. China has been one of the pioneers in promoting fintech markets during the past decade. Given that the former type of fintech will generate distinct investment risks while the latter one's risk is much slighter, China's regulator treats the two kinds of fintech differently. This article examines China's differing regulatory approaches to its investment-oriented and payment-oriented fintech sectors, respectively, and explores market conditions to which the above difference attributes. Beyond China, this article argues that a perfect result cannot be reached by pure external regulation; instead, successful regulation over investment-oriented fintech is significantly subject to the economic foundation of a given jurisdiction, among which maturity of investors is a constraint condition for mitigating risks in investment-oriented fintech industry.
{"title":"The political economy of the fintech regulation in China and its implications","authors":"Meihui Zhang ,&nbsp;Chi Zhang","doi":"10.1016/j.clsr.2024.106089","DOIUrl":"10.1016/j.clsr.2024.106089","url":null,"abstract":"<div><div>Fintech has seen exponential growth in recent years, breaking into markets often underserved by traditional financial services. Along with fintech's benefits, a series of risks caused by fintech has drawn regulators’ attention globally. Fintech activities can be generally categorised into two parts, namely investment-oriented fintech activities such as peer-to-peer lending, equity crowdfunding, and initial coin offerings; the other is payment-oriented fintech, which includes digital payment and central bank digital currencies. China has been one of the pioneers in promoting fintech markets during the past decade. Given that the former type of fintech will generate distinct investment risks while the latter one's risk is much slighter, China's regulator treats the two kinds of fintech differently. This article examines China's differing regulatory approaches to its investment-oriented and payment-oriented fintech sectors, respectively, and explores market conditions to which the above difference attributes. Beyond China, this article argues that a perfect result cannot be reached by pure external regulation; instead, successful regulation over investment-oriented fintech is significantly subject to the economic foundation of a given jurisdiction, among which maturity of investors is a constraint condition for mitigating risks in investment-oriented fintech industry.</div></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"56 ","pages":"Article 106089"},"PeriodicalIF":3.3,"publicationDate":"2024-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143138756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evolving cybersecurity of AI-featured digital products and services: Rise of standardisation and certification?
IF 3.3 3区 社会学 Q1 LAW Pub Date : 2024-12-04 DOI: 10.1016/j.clsr.2024.106093
Michal Rampášek, Matúš Mesarčík, Jozef Andraško
The field of cybersecurity has changed dramatically since the Cybersecurity Strategy for the Digital Decade was presented by the European Commission and the High Representative of the Union for Foreign Affairs and Security Policy in December 2020. The Cybersecurity Strategy highlights the potential of AI as a new technology, but also the need for cyber security of AI technology. Indeed, since the strategy was adopted, AI has shown that it has enormous potential for growth, but also several risks and vulnerabilities that this new technology brings. The paper analyses the shift and further development in the field of cybersecurity of digital products and services, AI itself as a technology, as well as products and services that will contain an AI component. In our opinion, the way to ensure that not only AI technology itself, but also products and services are cyber-secure, is to achieve a high level of standardisation of best practices, as there are many gaps in this area. The adoption of technical standards will fully form a path for conformity assessment and certification of not only AI systems but also AI-featured digital products and services. However, the current regulatory trend is to adopt a comprehensive legal regulation of AI even before such technical standards are fully developed and adopted. We consider this risky. Despite the well-intentioned effort to define and regulate AI, the purpose set forth in the AIA may not be achieved, as the requirements adopted in this way can very quickly become unnecessarily burdensome or even outdated due to increasing technological development. The proof of this is also the recent rise of large ML models, known as foundation models, which significantly changed the previous understanding of the creation of AI systems. It will be the technological development of AI, AI specific standardisation, and subsequent certification of digital products and services, which will govern future activities in building Europe's cyber resilience.
{"title":"Evolving cybersecurity of AI-featured digital products and services: Rise of standardisation and certification?","authors":"Michal Rampášek,&nbsp;Matúš Mesarčík,&nbsp;Jozef Andraško","doi":"10.1016/j.clsr.2024.106093","DOIUrl":"10.1016/j.clsr.2024.106093","url":null,"abstract":"<div><div>The field of cybersecurity has changed dramatically since the Cybersecurity Strategy for the Digital Decade was presented by the European Commission and the High Representative of the Union for Foreign Affairs and Security Policy in December 2020. The Cybersecurity Strategy highlights the potential of AI as a new technology, but also the need for cyber security of AI technology. Indeed, since the strategy was adopted, AI has shown that it has enormous potential for growth, but also several risks and vulnerabilities that this new technology brings. The paper analyses the shift and further development in the field of cybersecurity of digital products and services, AI itself as a technology, as well as products and services that will contain an AI component. In our opinion, the way to ensure that not only AI technology itself, but also products and services are cyber-secure, is to achieve a high level of standardisation of best practices, as there are many gaps in this area. The adoption of technical standards will fully form a path for conformity assessment and certification of not only AI systems but also AI-featured digital products and services. However, the current regulatory trend is to adopt a comprehensive legal regulation of AI even before such technical standards are fully developed and adopted. We consider this risky. Despite the well-intentioned effort to define and regulate AI, the purpose set forth in the AIA may not be achieved, as the requirements adopted in this way can very quickly become unnecessarily burdensome or even outdated due to increasing technological development. The proof of this is also the recent rise of large ML models, known as foundation models, which significantly changed the previous understanding of the creation of AI systems. It will be the technological development of AI, AI specific standardisation, and subsequent certification of digital products and services, which will govern future activities in building Europe's cyber resilience.</div></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"56 ","pages":"Article 106093"},"PeriodicalIF":3.3,"publicationDate":"2024-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143138544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Between progress and caution: LegalTech's promise in transforming personal credit risk management in China 在进步与谨慎之间:LegalTech在改变中国个人信用风险管理方面的承诺
IF 3.3 3区 社会学 Q1 LAW Pub Date : 2024-11-30 DOI: 10.1016/j.clsr.2024.106090
Duoqi Xu, Li Chen
The integration of LegalTech in China's financial and legal sectors offers useful insights for innovative legal practices, financial regulation and judicial reform. This article examines how LegalTech transforms personal credit risk management in China, analyzing its integration within banking compliance systems and judicial processes. It explores three key dimensions: the evolution of debt collection practices through technological innovation, the enhancement of public remedies through automated judicial systems, and the development of legal frameworks to legitimize LegalTech solutions. While highlighting LegalTech's potential to improve efficiency in credit risk resolution, the article addresses critical challenges including moral hazard in automated systems and the preservation of judicial discretion in technological implementation.
法律科技在中国金融和法律领域的整合为创新法律实践、金融监管和司法改革提供了有益的见解。本文探讨了LegalTech如何改变中国的个人信用风险管理,分析了其在银行合规系统和司法程序中的整合。它探讨了三个关键方面:通过技术创新的债务催收实践的演变,通过自动化司法系统加强公共救济,以及使法律技术解决方案合法化的法律框架的发展。在强调LegalTech在提高信用风险解决效率方面的潜力的同时,文章还解决了自动化系统中的道德风险和技术实施中司法自由裁量权的维护等关键挑战。
{"title":"Between progress and caution: LegalTech's promise in transforming personal credit risk management in China","authors":"Duoqi Xu,&nbsp;Li Chen","doi":"10.1016/j.clsr.2024.106090","DOIUrl":"10.1016/j.clsr.2024.106090","url":null,"abstract":"<div><div>The integration of LegalTech in China's financial and legal sectors offers useful insights for innovative legal practices, financial regulation and judicial reform. This article examines how LegalTech transforms personal credit risk management in China, analyzing its integration within banking compliance systems and judicial processes. It explores three key dimensions: the evolution of debt collection practices through technological innovation, the enhancement of public remedies through automated judicial systems, and the development of legal frameworks to legitimize LegalTech solutions. While highlighting LegalTech's potential to improve efficiency in credit risk resolution, the article addresses critical challenges including moral hazard in automated systems and the preservation of judicial discretion in technological implementation.</div></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"56 ","pages":"Article 106090"},"PeriodicalIF":3.3,"publicationDate":"2024-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142756883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Facial recognition technology in law enforcement: Regulating data analysis of another kind 执法中的面部识别技术:规范另一种数据分析
IF 3.3 3区 社会学 Q1 LAW Pub Date : 2024-11-29 DOI: 10.1016/j.clsr.2024.106092
Monika Simmler, Giulia Canova
Facial recognition technology (FRT) has emerged as a powerful tool for law enforcement, enabling the automated identification of individuals based on their unique facial features. Authorities have more and more made use of the technology to enhance criminal investigations through the analysis of images and video footage. In view of its increased use in Europe, this paper explores the legal implications of FRT in law enforcement under EU law and evaluates approaches to regulation. FRT use constitutes biometric data processing and comes with a particularly sensitive analysis of data. Its specific nature is grounded in the creation of a new (biometric) quality of data in order to subsequently compare for matches. Due to its impact on fundamental rights, this approach differs from conventional forensic analyses and must be appropriately regulated. Such regulation should consider the multiple data processing steps and reflect each step's impact on fundamental rights. From this procedural stance, the shortcomings of the EU Artificial Intelligence Act (AI Act) become evident. The AI Act contains specific rules for biometric AI systems but does not provide the necessary legal bases to justify FRT use by law enforcement. Without a comprehensive legal framework, such use is not permitted. This article provides concrete guidelines for addressing such regulation.
面部识别技术(FRT)已经成为执法部门的有力工具,可以根据个人独特的面部特征自动识别个人。当局越来越多地利用这项技术,通过分析图像和视频片段来加强刑事调查。鉴于其在欧洲的使用越来越多,本文探讨了FRT在欧盟法律执法中的法律含义,并评估了监管方法。FRT的使用构成了生物特征数据处理,并伴随着对数据的特别敏感的分析。它的特殊性是建立在一种新的(生物计量)数据质量的基础上,以便随后进行匹配比较。由于对基本权利的影响,这种方法不同于传统的法医分析,必须加以适当管制。这种规定应考虑到多个数据处理步骤,并反映每个步骤对基本权利的影响。从这一程序立场来看,欧盟人工智能法案(AI Act)的缺陷变得显而易见。人工智能法案包含生物识别人工智能系统的具体规则,但没有提供必要的法律依据来证明执法部门使用FRT的合理性。如果没有全面的法律框架,这种使用是不允许的。本文为解决此类监管问题提供了具体的指导方针。
{"title":"Facial recognition technology in law enforcement: Regulating data analysis of another kind","authors":"Monika Simmler,&nbsp;Giulia Canova","doi":"10.1016/j.clsr.2024.106092","DOIUrl":"10.1016/j.clsr.2024.106092","url":null,"abstract":"<div><div>Facial recognition technology (FRT) has emerged as a powerful tool for law enforcement, enabling the automated identification of individuals based on their unique facial features. Authorities have more and more made use of the technology to enhance criminal investigations through the analysis of images and video footage. In view of its increased use in Europe, this paper explores the legal implications of FRT in law enforcement under EU law and evaluates approaches to regulation. FRT use constitutes biometric data processing and comes with a particularly sensitive analysis of data. Its specific nature is grounded in the creation of a new (biometric) quality of data in order to subsequently compare for matches. Due to its impact on fundamental rights, this approach differs from conventional forensic analyses and must be appropriately regulated. Such regulation should consider the multiple data processing steps and reflect each step's impact on fundamental rights. From this procedural stance, the shortcomings of the EU Artificial Intelligence Act (AI Act) become evident. The AI Act contains specific rules for biometric AI systems but does not provide the necessary legal bases to justify FRT use by law enforcement. Without a comprehensive legal framework, such use is not permitted. This article provides concrete guidelines for addressing such regulation.</div></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"56 ","pages":"Article 106092"},"PeriodicalIF":3.3,"publicationDate":"2024-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142748477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Open or closing doors? The influence of ‘digital sovereignty’ in the EU's Cybersecurity Strategy on cybersecurity of open-source software 开门还是关门?欧盟网络安全战略中的 "数字主权 "对开源软件网络安全的影响
IF 3.3 3区 社会学 Q1 LAW Pub Date : 2024-11-25 DOI: 10.1016/j.clsr.2024.106078
Jennifer Tridgell
<div><div>‘Digital sovereignty’ is the geopolitical mantra of the moment. A key agent of that policy shift, the European Union (‘EU’) has increasingly embraced ‘digital sovereignty’ as both the ideological foundation and impetus for building its digital future in accordance with ‘European values and principles,’ often driven by and intersecting with cybersecurity concerns as articulated in its 2020 <em>Cybersecurity Strategy for the Digital Decade</em> (‘Strategy’). Yet it is impossible to consider cybersecurity without open-source software (‘OSS’). Increasingly, the EU, USA and other Governments have recognised that fact in the wake of HeartBleed and Log4j incidents. OSS’ decentralised governance and ubiquity, underpinning most software worldwide, may amplify vulnerabilities and adverse effects of cyberattacks, whilst its typically collaborative model of development and innovation often fosters valuable, open cybersecurity solutions.</div><div>In navigating that policy tightrope of OSS as a double-edged sword for cybersecurity, the EU has adopted ‘closed’ language of ‘digital sovereignty’ that is ostensibly contrary to the ‘open’ nature of OSS. That rhetorical duality is particularly pronounced since the EU described OSS as a tool for realising its ‘digital sovereignty,’ in addition to policy support for ‘a global, open, interoperable cyberspace’ alongside the pursuit of ‘digital sovereignty.’ While there is a epistemic gap in understanding the relationship between the EU's rhetoric of ‘digital sovereignty’ and reality, nascent studies indicate that it has a tangible effect on policy change in multiple digital spheres, generally furthering a degree of ‘control.’ However, that relationship within the OSS cybersecurity context has underexplored and poorly understood, although that policy is a priority for the EU and may bear significant implications for OSS globally.</div><div>Particularly analyzing the Cyber Resilience Act (‘CRA’) as key means for implementing the EU's Strategy and its first cybersecurity legislation that would comprehensively engage OSS if adopted by the Council, this article argues that the EU's desire to strengthening cybersecurity in OSS is generally welcome. Yet there is an ostensibly a disjunct between ‘digital sovereignty’ that underpins that legislation and OSS cybersecurity, with too much control of OSS potentially proving counterproductive for EU cybersecurity. This paper illustrates that (i) it is imperative for the EU to address OSS cybersecurity; (ii) yet the lens of digital sovereignty is ostensibly a rough fit for that approach, considering OSS’ philosophy and practice; and (iii) based on the CRA, EU's practice of translating ‘digital sovereignty’ into policy change is mixed, leaving uncertain ramifications for OSS cybersecurity in the EU and beyond. On the one hand, it moves towards more ‘control’ at least in determining definitional parameters and power dynamics with novel ‘stewardship’ positions for certain OSS
数字主权 "是当下的地缘政治口号。作为这一政策转变的主要推动者,欧洲联盟(简称 "欧盟")越来越多地将 "数字主权 "作为按照 "欧洲价值观和原则 "建设数字未来的思想基础和动力,其 "2020 数字十年网络安全战略"(简称 "战略")中所阐述的网络安全问题往往是这一政策转变的驱动力和交叉点。然而,要考虑网络安全问题,就不能不考虑开放源码软件("OSS")。在发生 HeartBleed 和 Log4j 事件后,欧盟、美国和其他国家的政府越来越认识到这一事实。开放源码软件的分散管理和无处不在的特性是全球大多数软件的基础,这可能会扩大网络攻击的漏洞和负面影响,而其典型的合作开发和创新模式往往会促进有价值的开放式网络安全解决方案。欧盟在追求 "数字主权 "的同时,还对 "全球、开放、可互操作的网络空间 "提供政策支持,因此欧盟将开放源码软件描述为实现其 "数字主权 "的工具,这种修辞上的双重性尤为明显。虽然在理解欧盟的 "数字主权 "言论与现实之间的关系方面还存在认识上的差距,但初步研究表明,它对多个数字领域的政策变化产生了切实的影响,总体上促进了一定程度的 "控制"。本文特别分析了《网络弹性法案》(Cyber Resilience Act,简称'CRA'),该法案是实施欧盟战略的关键手段,也是欧盟首部全面涉及开放源码软件的网络安全立法(如果获得理事会通过),本文认为,欧盟加强开放源码软件网络安全的愿望受到普遍欢迎。然而,作为该立法基础的 "数字主权 "与开放源码软件网络安全之间存在表面上的脱节,对开放源码软件的过多控制可能会对欧盟网络安全产生反作用。本文说明:(i) 欧盟必须解决开放源码软件的网络安全问题;(ii) 然而,考虑到开放源码软件的理念和实践,数字主权的视角表面上与这一方法大致吻合;(iii) 基于 CRA,欧盟将 "数字主权 "转化为政策变革的实践喜忧参半,给欧盟内外的开放源码软件网络安全带来了不确定的影响。一方面,至少在确定定义参数和权力动态方面,欧盟对某些开放源码软件实体采取了新的 "管理 "立场,从而实现了更多的 "控制"。尽管如此,欧盟一般会寻求利用开放源码软件来推动其地区对开放源码软件的拥护,而不是排斥其他国家。归根结底,欧盟拥有宝贵的领导机会,与其他国家合作推动开放源码软件网络安全解决方案,同时避免各自为政,保持开放,认识到全球挑战需要全球解决方案。这符合欧盟开明的自身利益。
{"title":"Open or closing doors? The influence of ‘digital sovereignty’ in the EU's Cybersecurity Strategy on cybersecurity of open-source software","authors":"Jennifer Tridgell","doi":"10.1016/j.clsr.2024.106078","DOIUrl":"10.1016/j.clsr.2024.106078","url":null,"abstract":"&lt;div&gt;&lt;div&gt;‘Digital sovereignty’ is the geopolitical mantra of the moment. A key agent of that policy shift, the European Union (‘EU’) has increasingly embraced ‘digital sovereignty’ as both the ideological foundation and impetus for building its digital future in accordance with ‘European values and principles,’ often driven by and intersecting with cybersecurity concerns as articulated in its 2020 &lt;em&gt;Cybersecurity Strategy for the Digital Decade&lt;/em&gt; (‘Strategy’). Yet it is impossible to consider cybersecurity without open-source software (‘OSS’). Increasingly, the EU, USA and other Governments have recognised that fact in the wake of HeartBleed and Log4j incidents. OSS’ decentralised governance and ubiquity, underpinning most software worldwide, may amplify vulnerabilities and adverse effects of cyberattacks, whilst its typically collaborative model of development and innovation often fosters valuable, open cybersecurity solutions.&lt;/div&gt;&lt;div&gt;In navigating that policy tightrope of OSS as a double-edged sword for cybersecurity, the EU has adopted ‘closed’ language of ‘digital sovereignty’ that is ostensibly contrary to the ‘open’ nature of OSS. That rhetorical duality is particularly pronounced since the EU described OSS as a tool for realising its ‘digital sovereignty,’ in addition to policy support for ‘a global, open, interoperable cyberspace’ alongside the pursuit of ‘digital sovereignty.’ While there is a epistemic gap in understanding the relationship between the EU's rhetoric of ‘digital sovereignty’ and reality, nascent studies indicate that it has a tangible effect on policy change in multiple digital spheres, generally furthering a degree of ‘control.’ However, that relationship within the OSS cybersecurity context has underexplored and poorly understood, although that policy is a priority for the EU and may bear significant implications for OSS globally.&lt;/div&gt;&lt;div&gt;Particularly analyzing the Cyber Resilience Act (‘CRA’) as key means for implementing the EU's Strategy and its first cybersecurity legislation that would comprehensively engage OSS if adopted by the Council, this article argues that the EU's desire to strengthening cybersecurity in OSS is generally welcome. Yet there is an ostensibly a disjunct between ‘digital sovereignty’ that underpins that legislation and OSS cybersecurity, with too much control of OSS potentially proving counterproductive for EU cybersecurity. This paper illustrates that (i) it is imperative for the EU to address OSS cybersecurity; (ii) yet the lens of digital sovereignty is ostensibly a rough fit for that approach, considering OSS’ philosophy and practice; and (iii) based on the CRA, EU's practice of translating ‘digital sovereignty’ into policy change is mixed, leaving uncertain ramifications for OSS cybersecurity in the EU and beyond. On the one hand, it moves towards more ‘control’ at least in determining definitional parameters and power dynamics with novel ‘stewardship’ positions for certain OSS ","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"56 ","pages":"Article 106078"},"PeriodicalIF":3.3,"publicationDate":"2024-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142701168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Botnet defense under EU data protection law 欧盟数据保护法下的僵尸网络防御
IF 3.3 3区 社会学 Q1 LAW Pub Date : 2024-11-21 DOI: 10.1016/j.clsr.2024.106080
Piotr Rataj
We analyse the legal framework spanned by EU data protection law with respect to the defence against botnet-related threats. In particular, we examine what legal constraints the General Data Protection Regulation (GDPR) (and others) impose on the processing of personal data when that processing aims at detecting botnet-related traffic. We thereby put data protection rules into perspective with current trends in European IT security regulation, specifically Directive 2022/2555/EU (NIS 2 Directive).
We find that the resulting legal landscape is complex and has not yet been sufficiently explored. Our analysis provides an initial evaluation of a wide range of emerging legal issues. In particular, we consider four typical processing scenarios, such as DNS sinkholing by a public authority or sharing of cybersecurity-related personal data, and discuss some of their legal problems, linking them as thoroughly as possible to potentially relevant case law of the European Court of Justice.
我们分析了欧盟数据保护法在防御僵尸网络相关威胁方面所涵盖的法律框架。特别是,我们研究了《通用数据保护条例》(GDPR)(及其他)对以检测僵尸网络相关流量为目的的个人数据处理施加了哪些法律限制。因此,我们将数据保护规则与欧洲 IT 安全法规的当前趋势,特别是第 2022/2555/EU 号指令(NIS 2 指令)结合起来。我们的分析对一系列新出现的法律问题进行了初步评估。特别是,我们考虑了四种典型的处理情景,如公共机构的 DNS sinkholing 或网络安全相关个人数据的共享,并讨论了其中的一些法律问题,尽可能全面地将其与欧洲法院可能的相关判例法联系起来。
{"title":"Botnet defense under EU data protection law","authors":"Piotr Rataj","doi":"10.1016/j.clsr.2024.106080","DOIUrl":"10.1016/j.clsr.2024.106080","url":null,"abstract":"<div><div>We analyse the legal framework spanned by EU data protection law with respect to the defence against botnet-related threats. In particular, we examine what legal constraints the General Data Protection Regulation (GDPR) (and others) impose on the processing of personal data when that processing aims at detecting botnet-related traffic. We thereby put data protection rules into perspective with current trends in European IT security regulation, specifically Directive 2022/2555/EU (NIS 2 Directive).</div><div>We find that the resulting legal landscape is complex and has not yet been sufficiently explored. Our analysis provides an initial evaluation of a wide range of emerging legal issues. In particular, we consider four typical processing scenarios, such as DNS sinkholing by a public authority or sharing of cybersecurity-related personal data, and discuss some of their legal problems, linking them as thoroughly as possible to potentially relevant case law of the European Court of Justice.</div></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"56 ","pages":"Article 106080"},"PeriodicalIF":3.3,"publicationDate":"2024-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142701167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automated vehicles, the ‘driver dilemma’, stopping powers, and paradigms of regulating road traffic 自动驾驶汽车、"驾驶员困境"、停车权和道路交通监管范式
IF 3.3 3区 社会学 Q1 LAW Pub Date : 2024-11-15 DOI: 10.1016/j.clsr.2024.106076
Mark Brady , Kieran Tranter , Belinda Bennett
This article examines the driver dilemma as it applies to the increasing automation of road traffic with a focus on roadside enforcement stopping powers. The driver dilemma exists where road traffic laws are expressed as directed toward human drivers. As automation increases, it becomes more problematic who is the driver, in fact and in law, for the purposes of international and national road traffic laws. An obvious solution to the driver dilemma is to enact reforms that deem automated driving systems ‘drivers’ under road traffic laws. This can be seen in recent amendments to the Vienna Convention on Road Traffic. However, the deeming solution has limitations. Through a case study on specific Australian provisions that authorise roadside enforcement officers to stop vehicles, two paradigms informing regulation of road traffic are revealed. The legacy paradigm, founded on the unity of driver and vehicle, conceives road transport involving individuals with an expectation of freedom of movement. The deeming solution attempts to preserve this paradigm. The case study also revealed an alternative paradigm of road traffic as a system that should be regulated to ensure overarching public policy goals. This alternative paradigm is evident in the specific passenger transport laws, where stopping powers are expressed as vehicle-centric. There is no driver proxy and no need for a further wrong for the powers to be enlivened. The article concludes that automated transport futures need this alternative paradigm of road traffic regulation and vehicle-centric rules should be a template for more adaptable road traffic laws.
本文以路边执法拦截权为重点,探讨了道路交通日益自动化所带来的驾驶员困境。驾驶员困境存在于道路交通法律针对人类驾驶员的情况下。随着自动化程度的提高,就国际和国内道路交通法律而言,在事实上和法律上谁是驾驶员变得越来越成问题。解决驾驶员困境的一个显而易见的办法是进行改革,将自动驾驶系统视为道路交通法中的 "驾驶员"。最近对《维也纳道路交通公约》的修订就体现了这一点。不过,视同解决方案也有局限性。通过对澳大利亚授权路边执法人员拦截车辆的具体规定进行案例研究,揭示了道路交通监管的两种范式。传统范式建立在驾驶员和车辆的统一性基础上,认为道路交通涉及到个人的行动自由。视同解决方案试图保留这一范式。案例研究还揭示了另一种范式,即道路交通是一个应受监管的系统,以确保实现公共政策的总体目标。这种另类范式在具体的客运法中很明显,在客运法中,拦截权以车辆为中心。没有驾驶员的代理,也不需要进一步的错误来激活权力。文章的结论是,未来的自动驾驶交通需要这种道路交通监管的替代范式,以车辆为中心的规则应成为适应性更强的道路交通法律的模板。
{"title":"Automated vehicles, the ‘driver dilemma’, stopping powers, and paradigms of regulating road traffic","authors":"Mark Brady ,&nbsp;Kieran Tranter ,&nbsp;Belinda Bennett","doi":"10.1016/j.clsr.2024.106076","DOIUrl":"10.1016/j.clsr.2024.106076","url":null,"abstract":"<div><div>This article examines the driver dilemma as it applies to the increasing automation of road traffic with a focus on roadside enforcement stopping powers. The driver dilemma exists where road traffic laws are expressed as directed toward human drivers. As automation increases, it becomes more problematic who is the driver, in fact and in law, for the purposes of international and national road traffic laws. An obvious solution to the driver dilemma is to enact reforms that deem automated driving systems ‘drivers’ under road traffic laws. This can be seen in recent amendments to the <em>Vienna Convention on Road Traffic</em>. However, the deeming solution has limitations. Through a case study on specific Australian provisions that authorise roadside enforcement officers to stop vehicles, two paradigms informing regulation of road traffic are revealed. The legacy paradigm, founded on the unity of driver and vehicle, conceives road transport involving individuals with an expectation of freedom of movement. The deeming solution attempts to preserve this paradigm. The case study also revealed an alternative paradigm of road traffic as a system that should be regulated to ensure overarching public policy goals. This alternative paradigm is evident in the specific passenger transport laws, where stopping powers are expressed as vehicle-centric. There is no driver proxy and no need for a further wrong for the powers to be enlivened. The article concludes that automated transport futures need this alternative paradigm of road traffic regulation and vehicle-centric rules should be a template for more adaptable road traffic laws.</div></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"56 ","pages":"Article 106076"},"PeriodicalIF":3.3,"publicationDate":"2024-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142656447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The dilemma and resolution of data circulation in China: Is data as consideration the solution? 中国数据流通的困境与解决之道:数据作为考量是否是解决之道?
IF 3.3 3区 社会学 Q1 LAW Pub Date : 2024-11-13 DOI: 10.1016/j.clsr.2024.106074
Xueting Fu
The circulation of data presents a significant challenge to the development of China's digital economy. On data exchanges, trading activity has declined. Off-exchange, stringent barriers between data-sharing consortia have resulted in data silos, producing crises of trust and legitimacy. Treating personal data as consideration, by incentivising individuals' motivation to share data through both financial gain and the protection of their personal rights, can establish a robust and comprehensive legal basis for extensive commercial data processing. Accordingly, this connects primary and secondary data element markets, facilitates data circulation, and strengthens the real economy. In the legal framework of personal data as consideration, the agreement between users and enterprises constitutes a bilateral contract, wherein individuals are obliged to "provide personal data and/ or authorise processing" as counter-performance. Through this exchange, enterprises, predicated on user authorisation, can secure one or more rights to hold, use or operate the data, thereby achieving a separation of data property rights. The data property rights enterprises acquire are governed by the principle of registration confrontation. The data subject's inheritors, prior or subsequent parties in transactions, and infringers are all third parties that could be confronted absolutely, while a subsequent licensee's ability to confront a prior licensee hinges on whether the pre-existing data property rights have been registered. Even when data property rights derive from a non-exclusive licence, the enterprise can still confront the bankruptcy administrator and proceed with data processing.
数据流通给中国数字经济的发展带来了巨大挑战。在数据交易所,交易活动减少。在交易所之外,数据共享联盟之间的严格壁垒造成了数据孤岛,产生了信任危机和合法性危机。将个人数据视为对价,通过经济收益和保护个人权利来激励个人分享数据,可以为广泛的商业数据处理建立健全而全面的法律基础。相应地,这将连接一级和二级数据要素市场,促进数据流通,加强实体经济。在以个人数据为对价的法律框架下,用户与企业之间的协议构成双边合同,个人有义务 "提供个人数据并/或授权处理 "作为反履行。通过这种交换,企业在用户授权的前提下,可以获得一项或多项持有、使用或操作数据的权利,从而实现数据产权的分离。企业获得的数据产权受登记对抗原则的制约。数据主体的继承人、交易中的在先或在后当事人以及侵权人都是可以绝对对抗的第三方,而在后被许可人能否对抗在先被许可人则取决于在先数据产权是否已经登记。即使数据产权来自非排他性许可,企业仍可对抗破产管理人并继续进行数据处理。
{"title":"The dilemma and resolution of data circulation in China: Is data as consideration the solution?","authors":"Xueting Fu","doi":"10.1016/j.clsr.2024.106074","DOIUrl":"10.1016/j.clsr.2024.106074","url":null,"abstract":"<div><div>The circulation of data presents a significant challenge to the development of China's digital economy. On data exchanges, trading activity has declined. Off-exchange, stringent barriers between data-sharing consortia have resulted in data silos, producing crises of trust and legitimacy. Treating personal data as consideration, by incentivising individuals' motivation to share data through both financial gain and the protection of their personal rights, can establish a robust and comprehensive legal basis for extensive commercial data processing. Accordingly, this connects primary and secondary data element markets, facilitates data circulation, and strengthens the real economy. In the legal framework of personal data as consideration, the agreement between users and enterprises constitutes a bilateral contract, wherein individuals are obliged to \"provide personal data and/ or authorise processing\" as counter-performance. Through this exchange, enterprises, predicated on user authorisation, can secure one or more rights to hold, use or operate the data, thereby achieving a separation of data property rights. The data property rights enterprises acquire are governed by the principle of registration confrontation. The data subject's inheritors, prior or subsequent parties in transactions, and infringers are all third parties that could be confronted absolutely, while a subsequent licensee's ability to confront a prior licensee hinges on whether the pre-existing data property rights have been registered. Even when data property rights derive from a non-exclusive licence, the enterprise can still confront the bankruptcy administrator and proceed with data processing.</div></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"56 ","pages":"Article 106074"},"PeriodicalIF":3.3,"publicationDate":"2024-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142656446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computer Law & Security Review
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1