首页 > 最新文献

Computer Law & Security Review最新文献

英文 中文
The ALTAI checklist as a tool to assess ethical and legal implications for a trustworthy AI development in education 将 ALTAI 清单作为评估人工智能在教育领域可靠发展的伦理和法律影响的工具
IF 2.9 3区 社会学 Q1 Social Sciences Pub Date : 2024-05-18 DOI: 10.1016/j.clsr.2024.105986
Andrea Fedele , Clara Punzi , Stefano Tramacere

The rapid proliferation of Artificial Intelligence (AI) applications in various domains of our lives has prompted a need for a shift towards a human-centered and trustworthy approach to AI. In this study we employ the Assessment List for Trustworthy Artificial Intelligence (ALTAI) checklist to evaluate the trustworthiness of Artificial Intelligence for Student Performance Prediction (AI4SPP), an AI-powered system designed to detect students at risk of school failure. We strongly support the ethical and legal development of AI and propose an implementation design where the user can choose to have access to each level of a three-tier outcome bundle: the AI prediction alone, the prediction along with its confidence level, and, lastly, local explanations for each grade prediction together with the previous two information. AI4SPP aims to raise awareness among educators and students regarding the factors contributing to low school performance, thereby facilitating the implementation of interventions not only to help students, but also to address biases within the school community. However, we also emphasize the ethical and legal concerns that could arise from a misuse of the AI4SPP tool. First of all, the collection and analysis of data, which is essential for the development of AI models, may lead to breaches of privacy, thus causing particularly adverse consequences in the case of vulnerable individuals. Furthermore, the system’s predictions may be influenced by unacceptable discrimination based on gender, ethnicity, or socio-economic background, leading to unfair actions. The ALTAI checklist serves as a valuable self-assessment tool during the design phase of AI systems, by means of which commonly overlooked weaknesses can be highlighted and addressed. In addition, the same checklist plays a crucial role throughout the AI system life cycle. Continuous monitoring of sensitive features within the dataset, alongside survey assessments to gauge users’ responses to the systems, is essential for gathering insights and intervening accordingly. We argue that adopting a critical approach to AI development is essential for societal progress, believing that it can evolve and accelerate over time without impeding openness to new technologies. By aligning with ethical principles and legal requirements, AI systems can make significant contributions to education while mitigating potential risks and ensuring a fair and inclusive learning environment.

人工智能(AI)应用在我们生活的各个领域迅速扩散,促使我们需要转向以人为本、值得信赖的人工智能方法。在这项研究中,我们采用了 "可信人工智能评估清单"(ALTAI)来评估 "学生成绩预测人工智能"(AI4SPP)的可信度,这是一个由人工智能驱动的系统,旨在检测有学业失败风险的学生。我们大力支持人工智能在道德和法律方面的发展,并提出了一种实施设计,即用户可以选择访问三级结果捆绑的每一级:单独的人工智能预测、预测及其置信度,最后是每个成绩预测的本地解释以及前两个信息。AI4SPP 旨在提高教育工作者和学生对导致学习成绩低下的因素的认识,从而促进干预措施的实施,不仅帮助学生,而且解决学校社区内的偏见。不过,我们也要强调滥用 AI4SPP 工具可能引发的道德和法律问题。首先,数据的收集和分析对人工智能模型的开发至关重要,但可能会导致侵犯隐私,从而对弱势个人造成特别不利的后果。此外,系统的预测可能会受到基于性别、种族或社会经济背景的不可接受的歧视的影响,从而导致不公平的行动。在人工智能系统的设计阶段,ALTAI 核对表可作为一种宝贵的自我评估工具,通过它可以突出和解决通常被忽视的弱点。此外,在人工智能系统的整个生命周期中,该清单也发挥着至关重要的作用。对数据集中的敏感特征进行持续监控,同时开展调查评估以了解用户对系统的反应,这对于收集洞察力和进行相应干预至关重要。我们认为,对人工智能的发展采取批判性的方法对社会进步至关重要,我们相信它可以随着时间的推移不断发展和加速,而不会阻碍对新技术的开放。通过与道德原则和法律要求保持一致,人工智能系统可以为教育做出重大贡献,同时降低潜在风险,确保公平、包容的学习环境。
{"title":"The ALTAI checklist as a tool to assess ethical and legal implications for a trustworthy AI development in education","authors":"Andrea Fedele ,&nbsp;Clara Punzi ,&nbsp;Stefano Tramacere","doi":"10.1016/j.clsr.2024.105986","DOIUrl":"https://doi.org/10.1016/j.clsr.2024.105986","url":null,"abstract":"<div><p>The rapid proliferation of Artificial Intelligence (AI) applications in various domains of our lives has prompted a need for a shift towards a human-centered and trustworthy approach to AI. In this study we employ the Assessment List for Trustworthy Artificial Intelligence (ALTAI) checklist to evaluate the trustworthiness of <em>Artificial Intelligence for Student Performance Prediction</em> (AI4SPP), an AI-powered system designed to detect students at risk of school failure. We strongly support the ethical and legal development of AI and propose an implementation design where the user can choose to have access to each level of a three-tier outcome bundle: the AI prediction alone, the prediction along with its confidence level, and, lastly, local explanations for each grade prediction together with the previous two information. AI4SPP aims to raise awareness among educators and students regarding the factors contributing to low school performance, thereby facilitating the implementation of interventions not only to help students, but also to address biases within the school community. However, we also emphasize the ethical and legal concerns that could arise from a misuse of the AI4SPP tool. First of all, the collection and analysis of data, which is essential for the development of AI models, may lead to breaches of privacy, thus causing particularly adverse consequences in the case of vulnerable individuals. Furthermore, the system’s predictions may be influenced by unacceptable discrimination based on gender, ethnicity, or socio-economic background, leading to unfair actions. The ALTAI checklist serves as a valuable self-assessment tool during the design phase of AI systems, by means of which commonly overlooked weaknesses can be highlighted and addressed. In addition, the same checklist plays a crucial role throughout the AI system life cycle. Continuous monitoring of sensitive features within the dataset, alongside survey assessments to gauge users’ responses to the systems, is essential for gathering insights and intervening accordingly. We argue that adopting a critical approach to AI development is essential for societal progress, believing that it can evolve and accelerate over time without impeding openness to new technologies. By aligning with ethical principles and legal requirements, AI systems can make significant contributions to education while mitigating potential risks and ensuring a fair and inclusive learning environment.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":null,"pages":null},"PeriodicalIF":2.9,"publicationDate":"2024-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0267364924000530/pdfft?md5=a59d3a1ec42519e7b4cdf7cbbe00551c&pid=1-s2.0-S0267364924000530-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141067681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Right to learn in the digital age: Challenges and protection in China 数字时代的学习权:中国的挑战与保护
IF 2.9 3区 社会学 Q1 Social Sciences Pub Date : 2024-05-17 DOI: 10.1016/j.clsr.2024.105989
Taixia Shen

The right to learn is a fundamental human right that can be summarized as a personal entitlement to acquire knowledge, increase one's wisdom, and fully develop inherent capacity through various learning approaches and activities. With the advent of the information age, the notion of right to education is unable to meet the needs of the development of human beings and society. Thus, introducing a concept with a rich connotation, namely, the right to learn is necessary. However, this right has not been stipulated and protected by constitutional law in most countries. The development of digital technology and artificial intelligence not only brings great opportunities for its realization, but also poses challenges to this right. In China, the economic and digital gap has led to the unequal and uneven development of the right to learn, while the rigid internet review system and expectations of digital copyright protection have hindered this right. To address these challenges in the information era, the government should address the right to learn as a fundamental right and establish a protection system in China's education law. Moreover, it should improve the fair use of the copyright system and strike a balance between the right to learn and copyright. In addition, emerging management rights and the equitable distribution of e-learning resources and digital infrastructure are essential to the right to learn.

学习权是一项基本人权,可以概括为通过各种学习方法和活动获取知识、增长智慧、充分发展内在能力的个人权利。随着信息时代的到来,受教育权的概念已无法满足人类和社会发展的需要。因此,有必要引入一个内涵丰富的概念,即学习权。然而,在大多数国家,这一权利并没有得到宪法的规定和保护。数字技术和人工智能的发展不仅为这一权利的实现带来了巨大的机遇,同时也对这一权利提出了挑战。在中国,经济和数字差距导致学习权发展不平等、不均衡,而僵化的网络审查制度和对数字版权保护的期待又阻碍了这一权利的实现。为了应对信息时代的这些挑战,政府应将学习权作为一项基本权利来对待,并在中国的教育法中建立保护制度。此外,还应完善版权的合理使用制度,在学习权与版权之间取得平衡。此外,新兴的管理权以及网络学习资源和数字基础设施的公平分配对学习权也至关重要。
{"title":"Right to learn in the digital age: Challenges and protection in China","authors":"Taixia Shen","doi":"10.1016/j.clsr.2024.105989","DOIUrl":"https://doi.org/10.1016/j.clsr.2024.105989","url":null,"abstract":"<div><p>The right to learn is a fundamental human right that can be summarized as a personal entitlement to acquire knowledge, increase one's wisdom, and fully develop inherent capacity through various learning approaches and activities. With the advent of the information age, the notion of <em>right to education</em> is unable to meet the needs of the development of human beings and society. Thus, introducing a concept with a rich connotation, namely, the <em>right to learn</em> is necessary. However, this right has not been stipulated and protected by constitutional law in most countries. The development of digital technology and artificial intelligence not only brings great opportunities for its realization, but also poses challenges to this right. In China, the economic and digital gap has led to the unequal and uneven development of the right to learn, while the rigid internet review system and expectations of digital copyright protection have hindered this right. To address these challenges in the information era, the government should address the right to learn as a fundamental right and establish a protection system in China's education law. Moreover, it should improve the fair use of the copyright system and strike a balance between the right to learn and copyright. In addition, emerging management rights and the equitable distribution of e-learning resources and digital infrastructure are essential to the right to learn.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":null,"pages":null},"PeriodicalIF":2.9,"publicationDate":"2024-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141067680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
China's Interim Measures on generative AI: Origin, content and significance 中国《人工智能发展暂行办法》:缘起、内容和意义
IF 2.9 3区 社会学 Q1 Social Sciences Pub Date : 2024-05-17 DOI: 10.1016/j.clsr.2024.105985
Sara Migliorini

On 15 August 2023, China's new rules on generative artificial intelligence (AI) entered into force. This article explores the underlying reasons and context for this rapid regulatory development. It argues that China's swift adoption of the Interim Measures on generative AI has been enabled by its traditional approach to digital policy, together with its renewed system of governance and the extensive work that Chinese regulators had conducted on AI ethics and relevant principles. The article also analyses some of the substantial rules laid down by the Interim Measures, offering scholars and policymakers working on generative AI regulation in other jurisdictions the possibility to engage with the solutions chosen by the Chinese regulators. To this end, the article brielfy presents key provisions regarding training data and IP rights; labelling of synthetic content; algorithm registration; accountability for content; and the applicability of existing laws to generative AI. It compares these aspects of the Interim Measures with examples from the European Union and the United States.

2023 年 8 月 15 日,中国关于生成式人工智能(AI)的新规定正式生效。本文探讨了这一快速监管发展的根本原因和背景。文章认为,中国之所以能迅速通过《人工智能暂行办法》,得益于其传统的数字政策方法、更新的治理体系以及中国监管机构在人工智能伦理和相关原则方面所做的大量工作。文章还分析了《暂行办法》规定的一些实质性规则,为其他司法管辖区从事生成式人工智能监管工作的学者和政策制定者提供了参与中国监管机构选择的解决方案的可能性。为此,文章介绍了有关训练数据和知识产权、合成内容标签、算法注册、内容问责以及现有法律对人工智能生成的适用性等方面的主要规定。文章将《暂行办法》的这些方面与欧盟和美国的例子进行了比较。
{"title":"China's Interim Measures on generative AI: Origin, content and significance","authors":"Sara Migliorini","doi":"10.1016/j.clsr.2024.105985","DOIUrl":"https://doi.org/10.1016/j.clsr.2024.105985","url":null,"abstract":"<div><p>On 15 August 2023, China's new rules on generative artificial intelligence (AI) entered into force. This article explores the underlying reasons and context for this rapid regulatory development. It argues that China's swift adoption of the Interim Measures on generative AI has been enabled by its traditional approach to digital policy, together with its renewed system of governance and the extensive work that Chinese regulators had conducted on AI ethics and relevant principles. The article also analyses some of the substantial rules laid down by the Interim Measures, offering scholars and policymakers working on generative AI regulation in other jurisdictions the possibility to engage with the solutions chosen by the Chinese regulators. To this end, the article brielfy presents key provisions regarding training data and IP rights; labelling of synthetic content; algorithm registration; accountability for content; and the applicability of existing laws to generative AI. It compares these aspects of the Interim Measures with examples from the European Union and the United States.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":null,"pages":null},"PeriodicalIF":2.9,"publicationDate":"2024-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141067679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How to think about freedom of thought (and opinion) in the age of AI 如何看待人工智能时代的思想(和观点)自由
IF 2.9 3区 社会学 Q1 Social Sciences Pub Date : 2024-05-17 DOI: 10.1016/j.clsr.2024.105969
Sue Anne Teo

The freedoms of thought (and opinion) are considered as absolute rights within the human rights law framework. Though found in separate provisions within the human rights instruments, the content and contours of these freedoms are largely interchangeable and overlap. The freedom of thought (and opinion) consists of three elements, namely, that thoughts and opinions can be kept private; thoughts cannot be manipulated with; and that one should not be punished for one's own thoughts. However, artificial intelligence (AI) driven systems increasingly deployed within online platforms facilitate the granular targeting and tailoring of choice architectures to the particularities of each individual, according to what is revealed or inferred by the AI system. This can enable platforms to shape the horizons of possibilities at scale for many individuals at once, enabling the power to modulate thoughts, expressions and actions. Drawing from literature on moral ethics and specifically the nascent field of the ethics of online manipulation, the aim of the article is to theorise the concept of manipulation and punishment in the context of the affordances of AI systems and examine when and how it impacts or breaches the freedoms of thought and opinion. The article argues that manipulation has to be conceived of as an objective concept, without hinging upon the eventuation of subjective effects on individuals, in order for the right to have practical meaning and import in the age of AI. Further, the term punishment has to be re-conceptualised to go beyond state sanctioned actions to include harms to autonomy conditions. This engages the fundamental concept of human dignity that lies as the normative foundation of the human rights framework. As novel material affordances increasingly structure and modulate the conditions for human interaction and communication, the focus of human rights protection has to shift from negative to positive obligations in order to ensure that conditions of possibilities for the freedoms of thought and opinion can take hold and be exercised in the first place. It concludes by proposing three steps that can be taken in order to afford autonomy conditions in line with the respect for these freedoms.

思想(和见解)自由被视为人权法框架内的绝对权利。尽管这些自由在人权文书中分别有不同的规定,但其内容和轮廓在很大程度上是可以互换和重叠的。思想(和意见)自由包括三个要素,即思想和意见可以保密;思想不能被操纵;以及一个人不应因自己的思想而受到惩罚。然而,人工智能(AI)驱动的系统越来越多地部署在网络平台上,根据人工智能系统所揭示或推断的内容,为细化目标和定制符合每个人特殊性的选择架构提供了便利。这可以使平台同时为许多人塑造大规模的可能性视野,从而有能力调节思想、表达和行动。文章借鉴了道德伦理学方面的文献,特别是新生的网络操纵伦理学领域,旨在从理论上阐述人工智能系统所能提供的操纵和惩罚概念,并研究它何时以及如何影响或侵犯思想和意见自由。文章认为,操纵必须被视为一个客观的概念,而不是取决于最终对个人的主观影响,这样这项权利才能在人工智能时代具有实际意义和重要性。此外,惩罚一词必须重新定义,以超越国家认可的行为,包括对自主条件的伤害。这涉及作为人权框架规范基础的人类尊严的基本概念。随着新的物质能力越来越多地构建和调节人类互动和交流的条件,人权保护的重点必须从消极义务转向积极义务,以确保思想和意见自由的可能性条件能够成立并首先得到行使。本报告最后提出了可以采取的三项措施,以提供与尊重这些自由相一致的自治条件。
{"title":"How to think about freedom of thought (and opinion) in the age of AI","authors":"Sue Anne Teo","doi":"10.1016/j.clsr.2024.105969","DOIUrl":"https://doi.org/10.1016/j.clsr.2024.105969","url":null,"abstract":"<div><p>The freedoms of thought (and opinion) are considered as absolute rights within the human rights law framework. Though found in separate provisions within the human rights instruments, the content and contours of these freedoms are largely interchangeable and overlap. The freedom of thought (and opinion) consists of three elements, namely, that thoughts and opinions can be kept private; thoughts cannot be manipulated with; and that one should not be punished for one's own thoughts. However, artificial intelligence (AI) driven systems increasingly deployed within online platforms facilitate the granular targeting and tailoring of choice architectures to the particularities of each individual, according to what is revealed or inferred by the AI system. This can enable platforms to shape the horizons of possibilities at scale for many individuals at once, enabling the power to modulate thoughts, expressions and actions. Drawing from literature on moral ethics and specifically the nascent field of the ethics of online manipulation, the aim of the article is to theorise the concept of manipulation and punishment in the context of the affordances of AI systems and examine when and how it impacts or breaches the freedoms of thought and opinion. The article argues that manipulation has to be conceived of as an objective concept, without hinging upon the eventuation of subjective effects on individuals, in order for the right to have practical meaning and import in the age of AI. Further, the term punishment has to be re-conceptualised to go beyond state sanctioned actions to include harms to autonomy conditions. This engages the fundamental concept of human dignity that lies as the normative foundation of the human rights framework. As novel material affordances increasingly structure and modulate the conditions for human interaction and communication, the focus of human rights protection has to shift from negative to positive obligations in order to ensure that conditions of possibilities for the freedoms of thought and opinion can take hold and be exercised in the first place. It concludes by proposing three steps that can be taken in order to afford autonomy conditions in line with the respect for these freedoms.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":null,"pages":null},"PeriodicalIF":2.9,"publicationDate":"2024-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141067685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Editorial to the special issue on financial technology and the law: A reality check 为 "金融技术与法律 "特刊撰写的社论:现实检验
IF 2.9 3区 社会学 Q1 Social Sciences Pub Date : 2024-05-15 DOI: 10.1016/j.clsr.2024.105983
Oscar Borgogno , Cristina Poncibò , Giuseppe Colangelo
{"title":"Editorial to the special issue on financial technology and the law: A reality check","authors":"Oscar Borgogno ,&nbsp;Cristina Poncibò ,&nbsp;Giuseppe Colangelo","doi":"10.1016/j.clsr.2024.105983","DOIUrl":"https://doi.org/10.1016/j.clsr.2024.105983","url":null,"abstract":"","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":null,"pages":null},"PeriodicalIF":2.9,"publicationDate":"2024-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140947494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersecurity of Internet of Things in the health sector: Understanding the applicable legal framework 卫生部门的物联网网络安全:了解适用的法律框架
IF 2.9 3区 社会学 Q1 Social Sciences Pub Date : 2024-05-10 DOI: 10.1016/j.clsr.2024.105982
Federica Casarosa

Although the digitalisation of healthcare is an ongoing process that dates back to more than two decades ago, it has gained more momentum with the COVID-19 pandemic. Recent developments in this sector include the adoption of wearable devices based on Internet of Things technology. The possibility of connecting devices that can work outside the physical boundaries of a hospital and follow patients at home, i.e. during their day-to-day life, has several obvious advantages. However, the digitalisation of the health sector through increased adoption of connected devices does not exclude vulnerabilities, particularly risks concerning the protection of patients’ data and the security of networks and information systems. Connected devices can gather, process, and store personal patient health data. Failure to safeguard the integrity and security of these data may affect the patients’ identity and finances and put their lives at risk. The presence of an IoT device in a healthcare setting may affect and reduce the level of network security of the overall system as it may provide an access point for an unlawful hacking attack. Although IoT technologies in the health sector are becoming increasingly pervasive, the European legal framework applicable to them is not clearly defined. This is extremely relevant in the case of cybersecurity, where the legal point of reference is the General Data Protection Regulation, addressing the measures and requirements applicable in case of data breaches, and the Medical Device Regulation, providing provisions focused on the security of data relevant to IoT defined as medical devices. The most recent interventions that address health data processing and cybersecurity are the proposed Cyber Resilience Act and the Health Data Space Regulation. The two acts provide measures and requirements applicable to IoT from two perspectives. Yet, they add complexities and some inconsistencies that may hamper the effectiveness of the overall cybersecurity framework.

尽管医疗保健数字化是一个持续的过程,可以追溯到二十多年前,但随着 COVID-19 大流行的发生,这一过程获得了更大的发展势头。该领域的最新发展包括采用基于物联网技术的可穿戴设备。这些设备可以在医院的物理边界之外工作,并在家中,即在患者的日常生活中对其进行跟踪。然而,通过更多地采用联网设备实现医疗行业数字化的同时,也不排除存在一些漏洞,特别是与患者数据保护以及网络和信息系统安全有关的风险。联网设备可以收集、处理和存储患者的个人健康数据。如果不能保护这些数据的完整性和安全性,可能会影响患者的身份和财务状况,并危及他们的生命。物联网设备在医疗环境中的存在可能会影响和降低整个系统的网络安全水平,因为它可能会成为非法黑客攻击的接入点。虽然物联网技术在医疗领域日益普及,但适用于这些技术的欧洲法律框架却没有明确规定。这一点与网络安全极为相关,在网络安全方面,法律参考点是《通用数据保护条例》和《医疗设备条例》,前者涉及数据泄露时适用的措施和要求,后者规定的重点是被定义为医疗设备的物联网相关数据的安全性。针对健康数据处理和网络安全的最新干预措施是拟议的《网络复原力法》和《健康数据空间条例》。这两项法案从两个角度提供了适用于物联网的措施和要求。然而,它们增加了复杂性和一些不一致性,可能会妨碍整个网络安全框架的有效性。
{"title":"Cybersecurity of Internet of Things in the health sector: Understanding the applicable legal framework","authors":"Federica Casarosa","doi":"10.1016/j.clsr.2024.105982","DOIUrl":"https://doi.org/10.1016/j.clsr.2024.105982","url":null,"abstract":"<div><p>Although the digitalisation of healthcare is an ongoing process that dates back to more than two decades ago, it has gained more momentum with the COVID-19 pandemic. Recent developments in this sector include the adoption of wearable devices based on Internet of Things technology. The possibility of connecting devices that can work outside the physical boundaries of a hospital and follow patients at home, i.e. during their day-to-day life, has several obvious advantages. However, the digitalisation of the health sector through increased adoption of connected devices does not exclude vulnerabilities, particularly risks concerning the protection of patients’ data and the security of networks and information systems. Connected devices can gather, process, and store personal patient health data. Failure to safeguard the integrity and security of these data may affect the patients’ identity and finances and put their lives at risk. The presence of an IoT device in a healthcare setting may affect and reduce the level of network security of the overall system as it may provide an access point for an unlawful hacking attack. Although IoT technologies in the health sector are becoming increasingly pervasive, the European legal framework applicable to them is not clearly defined. This is extremely relevant in the case of cybersecurity, where the legal point of reference is the General Data Protection Regulation, addressing the measures and requirements applicable in case of data breaches, and the Medical Device Regulation, providing provisions focused on the security of data relevant to IoT defined as medical devices. The most recent interventions that address health data processing and cybersecurity are the proposed Cyber Resilience Act and the Health Data Space Regulation. The two acts provide measures and requirements applicable to IoT from two perspectives. Yet, they add complexities and some inconsistencies that may hamper the effectiveness of the overall cybersecurity framework.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":null,"pages":null},"PeriodicalIF":2.9,"publicationDate":"2024-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140901093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pre-installed cameras in vehicles—New technology from a data protection law perspective 车载预装摄像头--从数据保护法角度看新技术
IF 2.9 3区 社会学 Q1 Social Sciences Pub Date : 2024-05-03 DOI: 10.1016/j.clsr.2024.105980
Tanja Kammersgaard Christensen

This article assesses whether the rules of the General Data Protection Regulation (GDPR) apply to cameras installed in vehicles, as well as how their use can be GDPR compliant and who is ultimately responsible for this. With the adoption of the GDPR, citizens of the EU now benefit from increased protection of their privacy, as the purpose of the Regulation is to lay down rules on the protection of natural persons in connection with the processing of personal data. The Regulation sets out several conditions for when and how personal data may be processed. These are reviewed in the following with a focus on cameras in cars.

本文将评估《一般数据保护条例》(GDPR)的规则是否适用于安装在车辆上的摄像头,以及如何使用这些摄像头才能符合 GDPR 的规定,谁是最终责任人。随着《一般数据保护条例》(GDPR)的通过,欧盟公民现在可以享受到更多的隐私保护,因为该条例的目的是制定与个人数据处理相关的自然人保护规则。该条例规定了何时以及如何处理个人数据的若干条件。下文将对这些条件进行审查,重点是车载摄像头。
{"title":"Pre-installed cameras in vehicles—New technology from a data protection law perspective","authors":"Tanja Kammersgaard Christensen","doi":"10.1016/j.clsr.2024.105980","DOIUrl":"https://doi.org/10.1016/j.clsr.2024.105980","url":null,"abstract":"<div><p>This article assesses whether the rules of the General Data Protection Regulation (GDPR) apply to cameras installed in vehicles, as well as how their use can be GDPR compliant and who is ultimately responsible for this. With the adoption of the GDPR, citizens of the EU now benefit from increased protection of their privacy, as the purpose of the Regulation is to lay down rules on the protection of natural persons in connection with the processing of personal data. The Regulation sets out several conditions for when and how personal data may be processed. These are reviewed in the following with a focus on cameras in cars.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":null,"pages":null},"PeriodicalIF":2.9,"publicationDate":"2024-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0267364924000475/pdfft?md5=4c68c0f48d2658a58e821bb09706c5d5&pid=1-s2.0-S0267364924000475-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140822163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The financialisation of Crypto: Designing an international regulatory consensus 加密货币的金融化:达成国际监管共识
IF 2.9 3区 社会学 Q1 Social Sciences Pub Date : 2024-05-02 DOI: 10.1016/j.clsr.2024.105970
Douglas W Arner , Dirk A Zetzsche , Ross P Buckley , Jamieson M Kirkwood

Bitcoin was presented in 2008 as a technology-driven alternative to the weaknesses of the traditional monetary, payment and financial systems dramatically highlighted by the Global Financial Crisis of 2008. The underlying technology – blockchain and distributed ledger technology – was posed as a technological solution to the problems of trust, confidence, transparency and behaviour traditionally addressed in finance through a framework of law, regulation and institutions (including markets and the state). Cryptocurrencies, blockchain, distributed ledger technology and decentralised finance were designed to address the weaknesses and risks in traditional finance. Yet fifteen years of evolution culminating in the Crypto Winter of 2022–23 have demonstrated that crypto is neither special nor immune and has come to feature all the classic problems of traditional finance. As the crypto ecosystem has evolved, the market failures and externalities of traditional finance have emerged – a process we term the ‘financialisation’ of crypto. These include conflicts of interests, information asymmetries, centralisation and interconnections, over-enthusiastic market participants, plus agency, operational and financial risks. We argue that (a) in order to develop successfully going forward, the crypto ecosystem needs to assimilate the centuries of experience of underpinning traditional finance with law and regulation, and (b) in the aftermath of the Crypto Winter, an international consensus is crystalising in respect of the regulation of the crypto ecosystem. We argue regulatory systems are now being instituted to ensure the proper functioning of crypto and its interconnections with traditional finance. The lessons of the financialisation of crypto also apply more broadly: appropriately designed regulatory systems are central to financial market functioning and development.

比特币是在 2008 年提出的,作为一种技术驱动的替代方案,以解决 2008 年全球金融危机所凸显的传统货币、支付和金融体系的弱点。其基础技术--区块链和分布式账本技术--被认为是解决信任、信心、透明度和行为问题的技术方案,而这些问题传统上是通过法律、监管和机构(包括市场和国家)框架来解决的。加密货币、区块链、分布式账本技术和去中心化金融旨在解决传统金融的弱点和风险。然而,15 年的演变以及 2022-23 年的加密货币之冬表明,加密货币既不特殊,也不能幸免,它已经出现了传统金融的所有典型问题。随着加密货币生态系统的发展,传统金融的市场失灵和外部性也随之出现--我们将这一过程称为加密货币的 "金融化"。这些问题包括利益冲突、信息不对称、集中化和相互关联、市场参与者过度热情,以及代理、运营和金融风险。我们认为:(a) 为了成功地向前发展,加密生态系统需要吸收几个世纪以来以法律和监管支撑传统金融的经验;(b) 在 "加密货币之冬 "之后,关于加密生态系统监管的国际共识正在形成。我们认为,目前正在建立监管制度,以确保加密货币的正常运作及其与传统金融的相互联系。加密货币金融化的教训也适用于更广泛的领域:设计合理的监管体系对于金融市场的运作和发展至关重要。
{"title":"The financialisation of Crypto: Designing an international regulatory consensus","authors":"Douglas W Arner ,&nbsp;Dirk A Zetzsche ,&nbsp;Ross P Buckley ,&nbsp;Jamieson M Kirkwood","doi":"10.1016/j.clsr.2024.105970","DOIUrl":"https://doi.org/10.1016/j.clsr.2024.105970","url":null,"abstract":"<div><p>Bitcoin was presented in 2008 as a technology-driven alternative to the weaknesses of the traditional monetary, payment and financial systems dramatically highlighted by the Global Financial Crisis of 2008. The underlying technology – blockchain and distributed ledger technology – was posed as a technological solution to the problems of trust, confidence, transparency and behaviour traditionally addressed in finance through a framework of law, regulation and institutions (including markets and the state). Cryptocurrencies, blockchain, distributed ledger technology and decentralised finance were designed to address the weaknesses and risks in traditional finance. Yet fifteen years of evolution culminating in the Crypto Winter of 2022–23 have demonstrated that crypto is neither special nor immune and has come to feature all the classic problems of traditional finance. As the crypto ecosystem has evolved, the market failures and externalities of traditional finance have emerged – a process we term the ‘financialisation’ of crypto. These include conflicts of interests, information asymmetries, centralisation and interconnections, over-enthusiastic market participants, plus agency, operational and financial risks. We argue that (a) in order to develop successfully going forward, the crypto ecosystem needs to assimilate the centuries of experience of underpinning traditional finance with law and regulation, and (b) in the aftermath of the Crypto Winter, an international consensus is crystalising in respect of the regulation of the crypto ecosystem. We argue regulatory systems are now being instituted to ensure the proper functioning of crypto and its interconnections with traditional finance. The lessons of the financialisation of crypto also apply more broadly: appropriately designed regulatory systems are central to financial market functioning and development.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":null,"pages":null},"PeriodicalIF":2.9,"publicationDate":"2024-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140822162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of trust service and software product regimes for zero-knowledge proof development under eIDAS 2.0 评估 eIDAS 2.0 零知识证明开发的信任服务和软件产品制度
IF 2.9 3区 社会学 Q1 Social Sciences Pub Date : 2024-04-30 DOI: 10.1016/j.clsr.2024.105968
Raül Ramos Fernández

This paper delves into two legal models for zero-knowledge proof protocols in the context of the eIDAS 2.0 Regulation: a trust service or a software product. The ARIES: reliAble euRopean Identity EcoSystem EU project highlighted the need for a legal framework for stakeholders to accept proof of the existence of user data with legal certainty, while Hyperledger Indy shows that ZKP solutions are currently commercialized, stressing deficiencies in the eIDAS 2.0. An overview of ZKP applied to identity, its relationship to the European Digital Identity Wallet and the electronic attestations of attributes, both introduced by the eIDAS 2.0, and Self-Sovereign Identity systems, leads to the central question of proof of the existence of user-held data as a trust service or as a software product and its data privacy implications for each approach. Finally, we outline a possible solution based on the product approach for future work. Our findings reveal that ZKP technology must have legal value and a presumption system to be effective. However, the path we take could lead us either to develop a system of surveillance and control in electronic environments or to build an environment where we share not the data itself but proof of its existence.

本文以 eIDAS 2.0 法规为背景,深入探讨了零知识证明协议的两种法律模式:信任服务或软件产品。ARIES:可靠的欧盟身份生态系统欧盟项目强调了利益相关者需要一个法律框架来接受具有法律确定性的用户数据存在证明,而Hyperledger Indy表明ZKP解决方案目前已经商业化,强调了eIDAS 2.0的不足之处。对 ZKP 应用于身份识别的概述、其与欧洲数字身份钱包和电子属性证明的关系(两者均由 eIDAS 2.0 和自治身份系统引入),引出了作为信任服务或软件产品的用户所持数据存在性证明这一核心问题及其对每种方法的数据隐私影响。最后,我们概述了基于产品方法的可能解决方案,供未来工作参考。我们的研究结果表明,ZKP 技术必须具备法律价值和推定系统才能有效。然而,我们所走的道路可能会导致我们要么开发出一种电子环境中的监视和控制系统,要么建立一种我们共享的不是数据本身而是数据存在证明的环境。
{"title":"Evaluation of trust service and software product regimes for zero-knowledge proof development under eIDAS 2.0","authors":"Raül Ramos Fernández","doi":"10.1016/j.clsr.2024.105968","DOIUrl":"https://doi.org/10.1016/j.clsr.2024.105968","url":null,"abstract":"<div><p>This paper delves into two legal models for zero-knowledge proof protocols in the context of the eIDAS 2.0 Regulation: a trust service or a software product. The ARIES: reliAble euRopean Identity EcoSystem EU project highlighted the need for a legal framework for stakeholders to accept proof of the existence of user data with legal certainty, while Hyperledger Indy shows that ZKP solutions are currently commercialized, stressing deficiencies in the eIDAS 2.0. An overview of ZKP applied to identity, its relationship to the European Digital Identity Wallet and the electronic attestations of attributes, both introduced by the eIDAS 2.0, and Self-Sovereign Identity systems, leads to the central question of proof of the existence of user-held data as a trust service or as a software product and its data privacy implications for each approach. Finally, we outline a possible solution based on the product approach for future work. Our findings reveal that ZKP technology must have legal value and a presumption system to be effective. However, the path we take could lead us either to develop a system of surveillance and control in electronic environments or to build an environment where we share not the data itself but proof of its existence.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":null,"pages":null},"PeriodicalIF":2.9,"publicationDate":"2024-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0267364924000359/pdfft?md5=857f41921a67e735151c4db9f816925c&pid=1-s2.0-S0267364924000359-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140816044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
In the name of protection—A critical analysis of China's legal framework of children's personal information protection in the digital era 以保护之名--对数字时代中国儿童个人信息保护法律框架的批判性分析
IF 2.9 3区 社会学 Q1 Social Sciences Pub Date : 2024-04-29 DOI: 10.1016/j.clsr.2024.105979
Guan Zheng, Jinchun Shu

This article provides a critical analysis of the China's legal framework of children's personal information protection in the digital era. It demonstrates that Chinese lawmakers adopt a dual-protection paradigm consisting of data privacy law and family law to protect children's personal information. In the field of data privacy law, China's Personal Information Protection Law regards children's personal information as sensitive information, and provides all contexts-based protection through the parental consent system, resulting in severe restrictions on children's freedom of access to information and their evolving capacities. In the field of family law, the Minors Protection Law fragments the right to informational self-determination of children while applying hard legal paternalism with respect to the online live-broadcast for children, limiting children's fundamental right to freedom of expression and depriving parents of the right to the custody of their children. Based on research in developmental psychology, this article argues that different legal frameworks should be adopted according to different age groups of children to protect the best interest of the child. In this way, the balance between the protection and informational self-determination of children in the digital era can be achieved.

本文对数字时代中国儿童个人信息保护的法律框架进行了批判性分析。它表明,中国立法者采用了由数据隐私法和家庭法组成的双重保护范式来保护儿童的个人信息。在数据隐私法领域,中国的《个人信息保护法》将儿童个人信息视为敏感信息,通过父母同意制度提供全语境保护,导致儿童获取信息的自由和发展能力受到严重限制。在家庭法领域,《未成年人保护法》割裂了儿童的信息自决权,同时对儿童的网络直播实行硬性的法律家长制,限制了儿童表达自由的基本权利,剥夺了父母对子女的监护权。本文基于发展心理学的研究,认为应根据儿童的不同年龄段采取不同的法律框架,以保护儿童的最大利益。这样才能在数字时代实现儿童保护与信息自决之间的平衡。
{"title":"In the name of protection—A critical analysis of China's legal framework of children's personal information protection in the digital era","authors":"Guan Zheng,&nbsp;Jinchun Shu","doi":"10.1016/j.clsr.2024.105979","DOIUrl":"https://doi.org/10.1016/j.clsr.2024.105979","url":null,"abstract":"<div><p>This article provides a critical analysis of the China's legal framework of children's personal information protection in the digital era. It demonstrates that Chinese lawmakers adopt a dual-protection paradigm consisting of data privacy law and family law to protect children's personal information. In the field of data privacy law, China's Personal Information Protection Law regards children's personal information as sensitive information, and provides all contexts-based protection through the parental consent system, resulting in severe restrictions on children's freedom of access to information and their evolving capacities. In the field of family law, the Minors Protection Law fragments the right to informational self-determination of children while applying hard legal paternalism with respect to the online live-broadcast for children, limiting children's fundamental right to freedom of expression and depriving parents of the right to the custody of their children. Based on research in developmental psychology, this article argues that different legal frameworks should be adopted according to different age groups of children to protect the best interest of the child. In this way, the balance between the protection and informational self-determination of children in the digital era can be achieved.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":null,"pages":null},"PeriodicalIF":2.9,"publicationDate":"2024-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140807549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computer Law & Security Review
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1