首页 > 最新文献

Computer Law & Security Review最新文献

英文 中文
Conversion of cryptoassets 转换加密资产
IF 3.3 3区 社会学 Q1 LAW Pub Date : 2024-10-02 DOI: 10.1016/j.clsr.2024.106060
Jiabin Lai
It is common for cryptoassets to be stolen, which raises the legal issue of whether cryptoassets can be converted. Under the current law, the tort of conversion applies only to tangibles. Cryptoassets cannot be converted because they are intangible. However, this article argues that it is arbitrary to determine whether cryptoassets are amenable to conversion based on the tangible/intangible distinction. Refusing to extend the tort of conversion to cryptoassets will lead to unfair treatment between cryptoassets and other assets. It will also provide inadequate protection for cryptoassets, which can be interfered with in ways similar to tangibles. This article argues that the tort of conversion should be extended to cryptoassets because they are property capable of possession. A tort for conversion of cryptoassets is established when a defendant has deliberately and exclusively interfered with a claimant's cryptoassets, and the defendant does not have a defence. Since conversion is a tort of strict liability, extending the tort to cryptoassets may create uncertain legal risks to third parties. To protect innocent third parties robustly, five defences should be established: innocent purchaser defence, abandonment, consent, self-help and safe harbour.
加密资产被盗的情况很常见,这就提出了加密资产是否可以转换的法律问题。根据现行法律,转换侵权行为只适用于有形资产。加密资产不能转换,因为它们是无形的。然而,本文认为,根据有形/无形的区别来确定加密资产是否可以转换是武断的。拒绝将转换侵权延伸至加密资产将导致加密资产与其他资产之间的不公平待遇。它还将为加密资产提供不充分的保护,因为加密资产可能会受到与有形资产类似的干扰。本文认为,转换侵权行为应扩展至加密资产,因为它们是能够占有的财产。当被告故意且专门干扰原告的加密资产,且被告没有抗辩理由时,转化加密资产的侵权行为即成立。由于转换是一种严格责任侵权行为,将该侵权行为扩展到加密资产可能会给第三方带来不确定的法律风险。为有力保护无辜第三方,应确立五项抗辩:无辜购买者抗辩、放弃、同意、自助和安全港。
{"title":"Conversion of cryptoassets","authors":"Jiabin Lai","doi":"10.1016/j.clsr.2024.106060","DOIUrl":"10.1016/j.clsr.2024.106060","url":null,"abstract":"<div><div>It is common for cryptoassets to be stolen, which raises the legal issue of whether cryptoassets can be converted. Under the current law, the tort of conversion applies only to tangibles. Cryptoassets cannot be converted because they are intangible. However, this article argues that it is arbitrary to determine whether cryptoassets are amenable to conversion based on the tangible/intangible distinction. Refusing to extend the tort of conversion to cryptoassets will lead to unfair treatment between cryptoassets and other assets. It will also provide inadequate protection for cryptoassets, which can be interfered with in ways similar to tangibles. This article argues that the tort of conversion should be extended to cryptoassets because they are property capable of possession. A tort for conversion of cryptoassets is established when a defendant has deliberately and exclusively interfered with a claimant's cryptoassets, and the defendant does not have a defence. Since conversion is a tort of strict liability, extending the tort to cryptoassets may create uncertain legal risks to third parties. To protect innocent third parties robustly, five defences should be established: innocent purchaser defence, abandonment, consent, self-help and safe harbour.</div></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"55 ","pages":"Article 106060"},"PeriodicalIF":3.3,"publicationDate":"2024-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142420545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Copyright protection during the training stage of generative AI: Industry-oriented U.S. law, rights-oriented EU law, and fair remuneration rights for generative AI training under the UN's international governance regime for AI 生成式人工智能训练阶段的版权保护:以产业为导向的美国法律、以权利为导向的欧盟法律,以及联合国人工智能国际治理制度下生成式人工智能训练的公平报酬权
IF 3.3 3区 社会学 Q1 LAW Pub Date : 2024-10-01 DOI: 10.1016/j.clsr.2024.106056
Kaigeng Li, Hong Wu, Yupeng Dong
Generative AI relies on simulating and learning from complex data distributions to automatically generate new, meaningful content from large datasets. Training generative AI models carries the risk of copyright infringement. How can we balance the development of generative AI technology with copyright protection during the training stage of these models? In contrast to existing legal scholarship, this article conducts a comparative study of industry-oriented U.S. copyright law and rights-oriented EU copyright law. It draws insights from the concepts of the tragedy of the commons and the tragedy of the anti-commons, proposing the creation of fair remuneration rights for Generative AI training under the UN's international governance regime for AI. This article offers a typological analysis of potential operational models for fair remuneration rights in Generative AI training, drawing analogies to existing remuneration rights in international copyright treaties. The goal is to provide an open framework for further discussion within the international academic community.
生成式人工智能依靠模拟和学习复杂的数据分布,从大型数据集中自动生成新的、有意义的内容。训练生成式人工智能模型存在侵犯版权的风险。在这些模型的训练阶段,我们如何平衡生成式人工智能技术的发展与版权保护之间的关系?与现有的法律学术研究不同,本文对以产业为导向的美国版权法和以权利为导向的欧盟版权法进行了比较研究。文章从公地悲剧和反公地悲剧的概念中汲取启示,提出在联合国人工智能国际治理制度下为生成式人工智能训练设立公平报酬权。本文通过类比国际版权条约中的现有报酬权,对生成式人工智能培训中公平报酬权的潜在运作模式进行了类型学分析。目的是为国际学术界的进一步讨论提供一个开放的框架。
{"title":"Copyright protection during the training stage of generative AI: Industry-oriented U.S. law, rights-oriented EU law, and fair remuneration rights for generative AI training under the UN's international governance regime for AI","authors":"Kaigeng Li,&nbsp;Hong Wu,&nbsp;Yupeng Dong","doi":"10.1016/j.clsr.2024.106056","DOIUrl":"10.1016/j.clsr.2024.106056","url":null,"abstract":"<div><div>Generative AI relies on simulating and learning from complex data distributions to automatically generate new, meaningful content from large datasets. Training generative AI models carries the risk of copyright infringement. How can we balance the development of generative AI technology with copyright protection during the training stage of these models? In contrast to existing legal scholarship, this article conducts a comparative study of industry-oriented U.S. copyright law and rights-oriented EU copyright law. It draws insights from the concepts of the tragedy of the commons and the tragedy of the anti-commons, proposing the creation of fair remuneration rights for Generative AI training under the UN's international governance regime for AI. This article offers a typological analysis of potential operational models for fair remuneration rights in Generative AI training, drawing analogies to existing remuneration rights in international copyright treaties. The goal is to provide an open framework for further discussion within the international academic community.</div></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"55 ","pages":"Article 106056"},"PeriodicalIF":3.3,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142420544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decentralized social networks and the future of free speech online 去中心化社交网络与网络言论自由的未来
IF 3.3 3区 社会学 Q1 LAW Pub Date : 2024-09-30 DOI: 10.1016/j.clsr.2024.106059
Tao Huang
Decentralized social networks like Mastodon and BlueSky are trending topics that have drawn much attention and discussion in recent years. By devolving powers from the central node to the end users, decentralized social networks aim to cure existing pathologies on the centralized platforms and have been viewed by many as the future of the Internet. This article critically and systematically assesses the decentralization project's prospect for communications online. It uses normative theories of free speech to examine whether and how the decentralization design could facilitate users’ freedom of expression online. The analysis shows that both promises and pitfalls exist, highlighting the importance of value-based design in this area. Two most salient issues for the design of the decentralized networks are: how to balance the decentralization ideal with constant needs of centralization on the network, and how to empower users to make them truly capable of exercising their control. The article then uses some design examples, such as the shared blocklist and the opt-in search function, to illustrate the value considerations underlying the design choices. Some tentative proposals for law and policy interventions are offered to better facilitate the design of the new network. Rather than providing clear answers, the article seeks to map the value implications of the design choices, highlight the stakes, and point directions for future research.
Mastodon和BlueSky等去中心化社交网络是近年来备受关注和讨论的热门话题。通过将权力从中心节点下放到终端用户,去中心化社交网络旨在治愈中心化平台上的现有病症,并被许多人视为互联网的未来。本文对去中心化项目的网络传播前景进行了批判性和系统性的评估。文章运用言论自由的规范理论,探讨去中心化设计是否以及如何促进用户的网络言论自由。分析表明,该项目既有前景,也有隐患,凸显了以价值为基础的设计在这一领域的重要性。去中心化网络设计的两个最突出的问题是:如何平衡去中心化理想与网络中心化的持续需求,以及如何赋予用户权力,使他们真正有能力行使控制权。文章随后使用了一些设计实例,如共享屏蔽列表和选择搜索功能,来说明设计选择背后的价值考量。文章提出了一些法律和政策干预的初步建议,以更好地促进新网络的设计。文章并没有提供明确的答案,而是试图描绘设计选择的价值影响,强调利害关系,并指出未来研究的方向。
{"title":"Decentralized social networks and the future of free speech online","authors":"Tao Huang","doi":"10.1016/j.clsr.2024.106059","DOIUrl":"10.1016/j.clsr.2024.106059","url":null,"abstract":"<div><div>Decentralized social networks like Mastodon and BlueSky are trending topics that have drawn much attention and discussion in recent years. By devolving powers from the central node to the end users, decentralized social networks aim to cure existing pathologies on the centralized platforms and have been viewed by many as the future of the Internet. This article critically and systematically assesses the decentralization project's prospect for communications online. It uses normative theories of free speech to examine whether and how the decentralization design could facilitate users’ freedom of expression online. The analysis shows that both promises and pitfalls exist, highlighting the importance of value-based design in this area. Two most salient issues for the design of the decentralized networks are: how to balance the decentralization ideal with constant needs of centralization on the network, and how to empower users to make them truly capable of exercising their control. The article then uses some design examples, such as the shared blocklist and the opt-in search function, to illustrate the value considerations underlying the design choices. Some tentative proposals for law and policy interventions are offered to better facilitate the design of the new network. Rather than providing clear answers, the article seeks to map the value implications of the design choices, highlight the stakes, and point directions for future research.</div></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"55 ","pages":"Article 106059"},"PeriodicalIF":3.3,"publicationDate":"2024-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142359551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Global data governance at a turning point? Rethinking China-U.S. cross-border data flow regulatory models 全球数据治理正处于转折点?反思中美跨境数据流监管模式
IF 3.3 3区 社会学 Q1 LAW Pub Date : 2024-09-30 DOI: 10.1016/j.clsr.2024.106061
Wanxiu Xu , Shuo Wang , Xiaodong Zuo
China and the United States have traditionally represented the ‘security paradigm’ and ‘freedom paradigm’ in their regulatory approaches to cross-border data flow. However, with the introduction of new rules governing these flows in both countries, this article challenges that perspective and explores the potential implications of this shift for global data governance. Specifically, it analyzes how the recent regulations in China and the United States serve as critical turning points affecting the transition between these paradigms, focusing on the overall regulatory frameworks and institutional developments in both nations. The article provides legal, institutional, and case-based examples to illustrate these changes. Furthermore, it offers a comparative analysis of the existing models for cross-border data flow regulation between China and the United States. Targeted compliance advice is provided for multinational corporations and other businesses frequently engaging in international operations that may be impacted by these regulatory changes. This research aims to deliver comprehensive insights into the latest regulatory developments in both countries and their existing models for cross-border data governance, thereby assisting enterprises in developing effective compliance strategies in practice.
中国和美国对跨境数据流的监管方式历来代表着 "安全范式 "和 "自由范式"。然而,随着中美两国出台新的数据流监管规则,本文对这一观点提出了挑战,并探讨了这一转变对全球数据治理的潜在影响。具体来说,文章分析了中国和美国最近的法规如何成为影响这些模式之间过渡的关键转折点,重点关注两国的整体监管框架和制度发展。文章提供了法律、制度和案例来说明这些变化。此外,文章还对中美跨境数据流监管的现有模式进行了比较分析。文章为可能受到这些监管变化影响的跨国公司和其他经常从事国际业务的企业提供了有针对性的合规建议。本研究旨在全面解读中美两国最新的监管动态及其现有的跨境数据治理模式,从而帮助企业在实践中制定有效的合规策略。
{"title":"Global data governance at a turning point? Rethinking China-U.S. cross-border data flow regulatory models","authors":"Wanxiu Xu ,&nbsp;Shuo Wang ,&nbsp;Xiaodong Zuo","doi":"10.1016/j.clsr.2024.106061","DOIUrl":"10.1016/j.clsr.2024.106061","url":null,"abstract":"<div><div>China and the United States have traditionally represented the ‘security paradigm’ and ‘freedom paradigm’ in their regulatory approaches to cross-border data flow. However, with the introduction of new rules governing these flows in both countries, this article challenges that perspective and explores the potential implications of this shift for global data governance. Specifically, it analyzes how the recent regulations in China and the United States serve as critical turning points affecting the transition between these paradigms, focusing on the overall regulatory frameworks and institutional developments in both nations. The article provides legal, institutional, and case-based examples to illustrate these changes. Furthermore, it offers a comparative analysis of the existing models for cross-border data flow regulation between China and the United States. Targeted compliance advice is provided for multinational corporations and other businesses frequently engaging in international operations that may be impacted by these regulatory changes. This research aims to deliver comprehensive insights into the latest regulatory developments in both countries and their existing models for cross-border data governance, thereby assisting enterprises in developing effective compliance strategies in practice.</div></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"55 ","pages":"Article 106061"},"PeriodicalIF":3.3,"publicationDate":"2024-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142359326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Collective cyber situational awareness in EU. A political project of difficult legal realisation? 欧盟的集体网络态势感知。法律上难以实现的政治项目?
IF 3.3 3区 社会学 Q1 LAW Pub Date : 2024-09-23 DOI: 10.1016/j.clsr.2024.106055
Federico Serini
From 2020 onward, the European cybersecurity strategy has seen a major reformulation of its objectives given the changed international environment. The policy documents reveal an interest in the establishment of an increasingly integrated overall security system, in which the relevant institutions of the Union have a central role. Among the various aspects considered is the establishment of a “collective situational awareness” based on the exchange of security information between Member States and European authorities, as well as between the Union authorities themselves. The sharing of security information is certainly an expression of the capacity for cooperation among Member States in the “Area of Freedom, Security and Justice” of the European Union. The analysis proposed in this contribution aims to study the organisation and procedures of information exchange to counter cyber threats (cybersecurity information sharing) in light of recent legislative interventions in the field of cybersecurity. After analysing the evolution of European administrations, and the tools employed in cybersecurity information sharing practices, the investigation focuses on the dynamic profiles related to the treatment of personal data and sensitive and classified information contained in said information by the different actors involved in the sharing process (private entities, single points of contact, law enforcement agencies, European institutions). The conclusions aim to formulate some considerations on the current state of the art in cybersecurity information sharing practices.
自 2020 年起,鉴于国际环境的变化,欧洲网络安全战略对其目标进行了重大调整。政策文件显示,人们希望建立一个日益一体化的整体安全系统,欧盟相关机构在其中发挥核心作用。在所考虑的各个方面中,包括在成员国与欧洲当局之间以及欧盟当局之间交流安全信息的基础上建立 "集体态势感知"。共享安全信息无疑体现了成员国在欧盟 "自由、安全和公正领域 "的合作能力。本文提出的分析旨在根据网络安全领域最近的立法干预,研究信息交流的组织和程序,以应对网络威胁(网络安全信息共享)。在分析了欧洲行政机构的演变和网络安全信息共享实践中使用的工具后,调查重点放在共享过程中涉及的不同参与者(私营实体、单一联络点、执法机构、欧洲机构)在处理个人数据以及上述信息中包含的敏感和机密信息时的动态概况。结论旨在就网络安全信息共享做法的现状提出一些考虑因素。
{"title":"Collective cyber situational awareness in EU. A political project of difficult legal realisation?","authors":"Federico Serini","doi":"10.1016/j.clsr.2024.106055","DOIUrl":"10.1016/j.clsr.2024.106055","url":null,"abstract":"<div><div>From 2020 onward, the European cybersecurity strategy has seen a major reformulation of its objectives given the changed international environment. The policy documents reveal an interest in the establishment of an increasingly integrated overall security system, in which the relevant institutions of the Union have a central role. Among the various aspects considered is the establishment of a “collective situational awareness” based on the exchange of security information between Member States and European authorities, as well as between the Union authorities themselves. The sharing of security information is certainly an expression of the capacity for cooperation among Member States in the “Area of Freedom, Security and Justice” of the European Union. The analysis proposed in this contribution aims to study the organisation and procedures of information exchange to counter cyber threats (cybersecurity information sharing) in light of recent legislative interventions in the field of cybersecurity. After analysing the evolution of European administrations, and the tools employed in cybersecurity information sharing practices, the investigation focuses on the dynamic profiles related to the treatment of personal data and sensitive and classified information contained in said information by the different actors involved in the sharing process (private entities, single points of contact, law enforcement agencies, European institutions). The conclusions aim to formulate some considerations on the current state of the art in cybersecurity information sharing practices.</div></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"55 ","pages":"Article 106055"},"PeriodicalIF":3.3,"publicationDate":"2024-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0267364924001213/pdfft?md5=42edd971292c8f2500a8a9b406de54f6&pid=1-s2.0-S0267364924001213-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142310363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assessing trustworthy AI: Technical and legal perspectives of fairness in AI 评估值得信赖的人工智能:从技术和法律角度看人工智能的公平性
IF 3.3 3区 社会学 Q1 LAW Pub Date : 2024-09-18 DOI: 10.1016/j.clsr.2024.106053
Markus Kattnig , Alessa Angerschmid , Thomas Reichel , Roman Kern

Artificial Intelligence systems are used more and more nowadays, from the application of decision support systems to autonomous vehicles. Hence, the widespread use of AI systems in various fields raises concerns about their potential impact on human safety and autonomy, especially regarding fair decision-making. In our research, we primarily concentrate on aspects of non-discrimination, encompassing both group and individual fairness. Therefore, it must be ensured that decisions made by such systems are fair and unbiased. Although there are many different methods for bias mitigation, few of them meet existing legal requirements. Unclear legal frameworks further worsen this problem. To address this issue, this paper investigates current state-of-the-art methods for bias mitigation and contrasts them with the legal requirements, with the scope limited to the European Union and with a particular focus on the AI Act. Moreover, the paper initially examines state-of-the-art approaches to ensure AI fairness, and subsequently, outlines various fairness measures. Challenges of defining fairness and the need for a comprehensive legal methodology to address fairness in AI systems are discussed. The paper contributes to the ongoing discussion on fairness in AI and highlights the importance of meeting legal requirements to ensure fairness and non-discrimination for all data subjects.

如今,从决策支持系统到自动驾驶汽车,人工智能系统的应用越来越广泛。因此,人工智能系统在各个领域的广泛应用引发了人们对其对人类安全和自主性的潜在影响的担忧,尤其是在公平决策方面。在我们的研究中,我们主要关注非歧视方面,包括群体公平和个人公平。因此,必须确保此类系统做出的决策是公平和无偏见的。尽管有许多不同的方法可以减少偏见,但其中很少有符合现行法律要求的。不明确的法律框架进一步加剧了这一问题。为解决这一问题,本文研究了当前最先进的减少偏差方法,并将其与法律要求进行对比,研究范围仅限于欧盟,尤其侧重于《人工智能法》。此外,本文初步研究了确保人工智能公平性的最新方法,随后概述了各种公平性措施。本文还讨论了界定公平性所面临的挑战,以及制定全面法律方法解决人工智能系统公平性问题的必要性。本文有助于当前关于人工智能公平性的讨论,并强调了满足法律要求以确保所有数据主体的公平性和非歧视性的重要性。
{"title":"Assessing trustworthy AI: Technical and legal perspectives of fairness in AI","authors":"Markus Kattnig ,&nbsp;Alessa Angerschmid ,&nbsp;Thomas Reichel ,&nbsp;Roman Kern","doi":"10.1016/j.clsr.2024.106053","DOIUrl":"10.1016/j.clsr.2024.106053","url":null,"abstract":"<div><p>Artificial Intelligence systems are used more and more nowadays, from the application of decision support systems to autonomous vehicles. Hence, the widespread use of AI systems in various fields raises concerns about their potential impact on human safety and autonomy, especially regarding fair decision-making. In our research, we primarily concentrate on aspects of non-discrimination, encompassing both group and individual fairness. Therefore, it must be ensured that decisions made by such systems are fair and unbiased. Although there are many different methods for bias mitigation, few of them meet existing legal requirements. Unclear legal frameworks further worsen this problem. To address this issue, this paper investigates current state-of-the-art methods for bias mitigation and contrasts them with the legal requirements, with the scope limited to the European Union and with a particular focus on the AI Act. Moreover, the paper initially examines state-of-the-art approaches to ensure AI fairness, and subsequently, outlines various fairness measures. Challenges of defining fairness and the need for a comprehensive legal methodology to address fairness in AI systems are discussed. The paper contributes to the ongoing discussion on fairness in AI and highlights the importance of meeting legal requirements to ensure fairness and non-discrimination for all data subjects.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"55 ","pages":"Article 106053"},"PeriodicalIF":3.3,"publicationDate":"2024-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0267364924001195/pdfft?md5=0ceed31afa59a3035b0d9fa71674adcc&pid=1-s2.0-S0267364924001195-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142239457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Resettlement by algorithm: Can artificial intelligence uphold human rights? 通过算法重新安置:人工智能能否维护人权?
IF 3.3 3区 社会学 Q1 LAW Pub Date : 2024-09-16 DOI: 10.1016/j.clsr.2024.106051
Meltem Ineli-Ciger

This article focuses on the potential use of artificial intelligence (AI) in the resettlement of refugees and its implications for their fundamental rights. Resettlement is the process of selecting refugees and transferring them to a third country that agrees to admit them permanently. While AI has the potential to improve efficiency and effectiveness in resettlement processes, such as matching refugees with suitable resettlement countries and places, it also poses various risks and raises concerns about human rights violations. The article examines the current and potential uses of AI throughout the resettlement process, including the selection and referral of refugees for resettlement and the facilitation and improvement of integration. The article then analyses the potential impact of AI on fundamental rights. The article concludes by arguing for a cautious approach to using AI in resettlement processes. It emphasises that the use of AI in assessing refugee inclusion and exclusion for resettlement, as well as matching them with different resettlement states, could conflict with fundamental rights. This raises concerns about transparency, explainability, accountability, effective remedies, data protection, and the risk of bias and discrimination.

本文重点讨论人工智能(AI)在难民安置中的潜在应用及其对难民基本权利的影响。重新安置是选择难民并将其转移到同意永久接纳他们的第三国的过程。虽然人工智能有可能提高重新安置过程的效率和效力,如将难民与合适的重新安置国家和地点相匹配,但它也会带来各种风险,并引发对侵犯人权行为的担忧。文章探讨了人工智能在整个重新安置过程中的当前和潜在用途,包括选择和转介难民进行重新安置,以及促进和改善难民融入社会。然后,文章分析了人工智能对基本权利的潜在影响。文章最后主张在重新安置过程中谨慎使用人工智能。文章强调,在评估难民是否被纳入重新安置以及将他们与不同的重新安置国进行匹配时使用人工智能,可能会与基本权利发生冲突。这引起了对透明度、可解释性、问责制、有效补救、数据保护以及偏见和歧视风险的关注。
{"title":"Resettlement by algorithm: Can artificial intelligence uphold human rights?","authors":"Meltem Ineli-Ciger","doi":"10.1016/j.clsr.2024.106051","DOIUrl":"10.1016/j.clsr.2024.106051","url":null,"abstract":"<div><p>This article focuses on the potential use of artificial intelligence (AI) in the resettlement of refugees and its implications for their fundamental rights. Resettlement is the process of selecting refugees and transferring them to a third country that agrees to admit them permanently. While AI has the potential to improve efficiency and effectiveness in resettlement processes, such as matching refugees with suitable resettlement countries and places, it also poses various risks and raises concerns about human rights violations. The article examines the current and potential uses of AI throughout the resettlement process, including the selection and referral of refugees for resettlement and the facilitation and improvement of integration. The article then analyses the potential impact of AI on fundamental rights. The article concludes by arguing for a cautious approach to using AI in resettlement processes. It emphasises that the use of AI in assessing refugee inclusion and exclusion for resettlement, as well as matching them with different resettlement states, could conflict with fundamental rights. This raises concerns about transparency, explainability, accountability, effective remedies, data protection, and the risk of bias and discrimination.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"55 ","pages":"Article 106051"},"PeriodicalIF":3.3,"publicationDate":"2024-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142239458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Contextualizing Personal Information: Privacy's Post-Neoliberal Constitutionalism and Its Heterogeneous Imperfections in China 个人信息的语境化:隐私权的后新自由主义宪政及其在中国的异质性缺陷
IF 3.3 3区 社会学 Q1 LAW Pub Date : 2024-09-14 DOI: 10.1016/j.clsr.2024.106030
Wayne Wei Wang

This article examines the evolutionary trajectory of perceptual diversification concerning Yinsi, privacy, and personal information in China. It elucidates how efforts to integrate privacy within the constitutional framework, a complex undertaking, have resulted in a heterogeneous system. This system forges an economically rational, technologically trustworthy, and socially experimental infrastructure that simultaneously embodies materialist and post-neoliberal characteristics. The study traces the transformation from collectivist and charismatic conceptualization to judicial unevenness arising from the unwritten nature of de-constitutionalized privacy. This evolution ultimately leads to digital incentive compatibility, reflecting a pressure-driven post-neoliberal economic rationale. Personal information with Chinese characteristics represents a normative construct aimed at harmonizing economic liberties and enhancing market efficiency while exemplifying sovereign statecraft of data production relations. The article underscores China's paternalist yet inertial adaptability, manifested in its pursuit of legal and institutional reforms concerning social identity, shaping socio-economic and performance legitimacy structures. Furthermore, the study introduces a tripartite cognitive and infrastructural schema of identifiability, incorporating legal, technological, and social dimensions to highlight the interchangeable roles that the state, private sector, and individuals have played in institutionalizing identities. The inherent complexities of such systems might expose them to market inefficiencies and digital harms, particularly when hierarchical interventions deviate from the original economic intention of data production and circulation. Consequently, the article advocates for elevating privacy constitutionalism to a more explicit and codified status in both legislative and judicial domains. This elevation would confer formal authority to address imbalances and unchecked competing interests in public and private stakeholderism, ultimately striving for a polycentric and proportionate (re-)equilibrium between the normative efficiency of identity infrastructures and the preservation of moral rights in digital China.

本文探讨了中国关于 "阴司"、隐私和个人信息的观念多样化的演变轨迹。文章阐明了将隐私权纳入宪法框架这一复杂工作是如何形成一个异质系统的。这一体系形成了经济上合理、技术上可信、社会上试验的基础设施,同时体现了唯物主义和后新自由主义的特征。本研究追溯了从集体主义和魅力概念化到去制度化隐私的不成文性质所导致的司法不均衡的转变过程。这一演变最终导致数字激励相容,反映了压力驱动的后新自由主义经济原理。具有中国特色的个人信息代表了一种规范性建构,旨在协调经济自由和提高市场效率,同时体现了数据生产关系的主权国家手段。文章强调了中国家长式而又惯性的适应性,这体现在其对社会身份的法律和制度改革的追求上,塑造了社会经济和政绩的合法性结构。此外,该研究还引入了一个可识别性的三方认知和基础结构模式,将法律、技术和社会维度纳入其中,以强调国家、私营部门和个人在身份制度化过程中所扮演的可互换角色。这些系统固有的复杂性可能会使其面临市场低效和数字危害,尤其是当分级干预偏离了数据生产和流通的经济初衷时。因此,文章主张在立法和司法领域将隐私宪法主义提升到更加明确和成文的地位。这种提升将赋予正式的权威,以解决公共和私人利益相关者之间不平衡和不受约束的利益竞争,最终在身份基础设施的规范效率和数字中国的道德权利保护之间实现多中心和相称的(再)平衡。
{"title":"Contextualizing Personal Information: Privacy's Post-Neoliberal Constitutionalism and Its Heterogeneous Imperfections in China","authors":"Wayne Wei Wang","doi":"10.1016/j.clsr.2024.106030","DOIUrl":"10.1016/j.clsr.2024.106030","url":null,"abstract":"<div><p>This article examines the evolutionary trajectory of perceptual diversification concerning Yinsi, privacy, and personal information in China. It elucidates how efforts to integrate privacy within the constitutional framework, a complex undertaking, have resulted in a heterogeneous system. This system forges an economically rational, technologically trustworthy, and socially experimental infrastructure that simultaneously embodies materialist and post-neoliberal characteristics. The study traces the transformation from collectivist and charismatic conceptualization to judicial unevenness arising from the unwritten nature of de-constitutionalized privacy. This evolution ultimately leads to digital incentive compatibility, reflecting a pressure-driven post-neoliberal economic rationale. Personal information with Chinese characteristics represents a normative construct aimed at harmonizing economic liberties and enhancing market efficiency while exemplifying sovereign statecraft of data production relations. The article underscores China's paternalist yet inertial adaptability, manifested in its pursuit of legal and institutional reforms concerning social identity, shaping socio-economic and performance legitimacy structures. Furthermore, the study introduces a tripartite cognitive and infrastructural schema of identifiability, incorporating legal, technological, and social dimensions to highlight the interchangeable roles that the state, private sector, and individuals have played in institutionalizing identities. The inherent complexities of such systems might expose them to market inefficiencies and digital harms, particularly when hierarchical interventions deviate from the original economic intention of data production and circulation. Consequently, the article advocates for elevating privacy constitutionalism to a more explicit and codified status in both legislative and judicial domains. This elevation would confer formal authority to address imbalances and unchecked competing interests in public and private stakeholderism, ultimately striving for a polycentric and proportionate (re-)equilibrium between the normative efficiency of identity infrastructures and the preservation of moral rights in digital China.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"55 ","pages":"Article 106030"},"PeriodicalIF":3.3,"publicationDate":"2024-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142233068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Christian perspectives on the regulation of posthumous medical data donation (PMDD): An empirical study 基督教对遗体医学数据捐赠(PMDD)监管的观点:实证研究
IF 3.3 3区 社会学 Q1 LAW Pub Date : 2024-09-11 DOI: 10.1016/j.clsr.2024.106052
Henry Pearce (Senior Lecturer in Law)

This article sets out the results of an empirical study exploring the intersection of religious views and perspectives and the regulation of post-mortem data donation (PMDD), particularly focusing on issues of consent and individual control. Through semi-structured interviews with practicing members of the Christian clergy of the United Kingdom, the study investigated the ethical and practical implications of integrating religious viewpoints into secular debates on data protection and privacy, using PMDD as a use case. The findings revealed a consensus among participants that religious perspectives, including Christian perspectives, can enhance the ethical robustness of PMDD regulatory frameworks by promoting values such as dignity, autonomy, and respect for individual preferences. However, the study also identified a possible gap in the systematic consideration of these views within existing regulatory practices pertaining to data protection and privacy. Pursuant to these findings, the article argues for the adoption of an "opt-out" consent mechanism, which balances public health benefits with individual rights, as a pragmatic approach to PMDD regulation. Additionally, the article highlights the potential for religious insights to enrich policy dialogues, ensuring that legal rules relating to data protection and information governance resonate with a broader array of societal values.

本文阐述了一项实证研究的结果,该研究探讨了宗教观点和视角与死后数据捐赠(PMDD)监管的交叉点,尤其关注同意和个人控制问题。通过对英国基督教神职人员的半结构式访谈,该研究调查了将宗教观点纳入有关数据保护和隐私的世俗辩论的伦理和实际影响,并将 PMDD 作为一个使用案例。研究结果表明,参与者一致认为,宗教观点(包括基督教观点)可以通过倡导尊严、自主和尊重个人偏好等价值观,提高 PMDD 监管框架的伦理稳健性。不过,研究也发现,在与数据保护和隐私相关的现有监管实践中,系统地考虑这些观点可能存在差距。根据这些研究结果,文章主张采用 "选择不同意 "机制,在公共卫生利益与个人权利之间取得平衡,以此作为 PMDD 监管的务实方法。此外,文章还强调了宗教见解丰富政策对话的潜力,确保与数据保护和信息治理有关的法律规则与更广泛的社会价值观产生共鸣。
{"title":"Christian perspectives on the regulation of posthumous medical data donation (PMDD): An empirical study","authors":"Henry Pearce (Senior Lecturer in Law)","doi":"10.1016/j.clsr.2024.106052","DOIUrl":"10.1016/j.clsr.2024.106052","url":null,"abstract":"<div><p>This article sets out the results of an empirical study exploring the intersection of religious views and perspectives and the regulation of post-mortem data donation (PMDD), particularly focusing on issues of consent and individual control. Through semi-structured interviews with practicing members of the Christian clergy of the United Kingdom, the study investigated the ethical and practical implications of integrating religious viewpoints into secular debates on data protection and privacy, using PMDD as a use case. The findings revealed a consensus among participants that religious perspectives, including Christian perspectives, can enhance the ethical robustness of PMDD regulatory frameworks by promoting values such as dignity, autonomy, and respect for individual preferences. However, the study also identified a possible gap in the systematic consideration of these views within existing regulatory practices pertaining to data protection and privacy. Pursuant to these findings, the article argues for the adoption of an \"opt-out\" consent mechanism, which balances public health benefits with individual rights, as a pragmatic approach to PMDD regulation. Additionally, the article highlights the potential for religious insights to enrich policy dialogues, ensuring that legal rules relating to data protection and information governance resonate with a broader array of societal values.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"55 ","pages":"Article 106052"},"PeriodicalIF":3.3,"publicationDate":"2024-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0267364924001183/pdfft?md5=d29d381aa1608799982b7a99e384820d&pid=1-s2.0-S0267364924001183-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142169522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Metaverse impact on the politics means 元宇宙对政治的影响意味着
IF 3.3 3区 社会学 Q1 LAW Pub Date : 2024-09-10 DOI: 10.1016/j.clsr.2024.106037
Matías Mascitti

Here, I pose a hypothetical scenario starring the Metaverse arrival in fifteen years. First, I describe this network of networks. Then, I provide some notes on the Metaverse impact on the politics means in the constitutional states, i.e., rule of law, democracy, and human rights. Next, I propose some measures to fit that political means to the Metaverse ecosystem. Hence, they will serve as the basis for the Metaverse regulation in advance and -in turn- they will be useful as a starting point for the academic debate and will enlighten us for the analysis of concepts and institutions that today require reforms because they are not suitable for the regulation of intersubjective conducts in the digital era; e.g., civil liability for damage caused by robotics and autonomous systems, 'unlimited' power of Terms of service imposition by largest internet platforms, real democracy weakness, data and privacy protection by the use of extended reality tools, non-personal data protection.

在此,我提出了一个假设情景,即十五年后 Metaverse 的到来。首先,我将描述这个网络之网。然后,我就 Metaverse 对宪政国家政治手段(即法治、民主和人权)的影响做一些说明。接下来,我将提出一些措施,使这些政治手段与 Metaverse 生态系统相适应。因此,这些措施将作为元宇宙监管的基础,反过来,它们也将作为学术讨论的起点,启发我们分析当今需要改革的概念和制度,因为它们不适合监管数字时代的主体间行为;例如,机器人和自主系统造成损害的民事责任、最大互联网平台强加服务条款的 "无限 "权力、真正民主的弱点、使用扩展现实工具的数据和隐私保护、非个人数据保护。
{"title":"The Metaverse impact on the politics means","authors":"Matías Mascitti","doi":"10.1016/j.clsr.2024.106037","DOIUrl":"10.1016/j.clsr.2024.106037","url":null,"abstract":"<div><p>Here, I pose a hypothetical scenario starring the Metaverse arrival in fifteen years. First, I describe this network of networks. Then, I provide some notes on the Metaverse impact on the politics means in the constitutional states, i.e., rule of law, democracy, and human rights. Next, I propose some measures to fit that political means to the Metaverse ecosystem. Hence, they will serve as the basis for the Metaverse regulation in advance and -in turn- they will be useful as a starting point for the academic debate and will enlighten us for the analysis of concepts and institutions that today require reforms because they are not suitable for the regulation of intersubjective conducts in the digital era; e.g., civil liability for damage caused by robotics and autonomous systems, 'unlimited' power of Terms of service imposition by largest internet platforms, real democracy weakness, data and privacy protection by the use of extended reality tools, non-personal data protection.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"55 ","pages":"Article 106037"},"PeriodicalIF":3.3,"publicationDate":"2024-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142164725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computer Law & Security Review
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1