首页 > 最新文献

International Review of Law, Computers and Technology最新文献

英文 中文
IP, Technology and Policy Interventions in India: Creating a roadmap for the digital economy 印度的知识产权、技术和政策干预:为数字经济制定路线图
Q1 Social Sciences Pub Date : 2022-05-16 DOI: 10.1080/13600869.2022.2076044
Indranath Gupta
Modelling data business model and strategy. organisation co-relation between evolving privacy regulations business model restructuring. to re-strategise
建模数据业务模型和策略。组织之间的相互关系,不断发展的隐私法规,商业模式重组。对re-strategise
{"title":"IP, Technology and Policy Interventions in India: Creating a roadmap for the digital economy","authors":"Indranath Gupta","doi":"10.1080/13600869.2022.2076044","DOIUrl":"https://doi.org/10.1080/13600869.2022.2076044","url":null,"abstract":"Modelling data business model and strategy. organisation co-relation between evolving privacy regulations business model restructuring. to re-strategise","PeriodicalId":53660,"journal":{"name":"International Review of Law, Computers and Technology","volume":"46 1","pages":"309 - 311"},"PeriodicalIF":0.0,"publicationDate":"2022-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83172138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The IoT and the new EU cybersecurity regulatory landscape 物联网和新的欧盟网络安全监管格局
Q1 Social Sciences Pub Date : 2022-05-04 DOI: 10.1080/13600869.2022.2060468
P. G. Chiara
ABSTRACT This article aims to cast light on how the fast-evolving European cybersecurity regulatory framework would impact the Internet of Things (IoT) domain. The legal analysis investigates whether and to what extent existing and proposed sectoral EU legislation addresses the manifold challenges in securing IoT and its supply chain. It firstly takes into account the Cybersecurity Act, being the most recent and relevant EU legal act covering ICT products and cybersecurity services. Then, EU product legislation is scrutinised. The analysis focuses on the delegated act recently adopted by the Commission under the Radio Equipment Directive (RED), strengthening wireless devices’ cybersecurity, the Medical Devices Regulation, the Proposal for a General Product Safety Regulation and the Proposal for a Machinery Regulation. Lastly, the proposal for a revised Network and Information Systems Directive (NIS2) is assessed in terms of its potential impact on the field of IoT cybersecurity. Against this backdrop, the article concludes by advocating the need for a separate horizontal legislation on cybersecurity for connected products. To avoid fragmentation of the EU's Single Market, a horizontal legal act should be based on the principles of the New Legislative Framework, with ex-ante and ex-post cybersecurity requirements for all IoT sectors and products categories.
本文旨在阐明快速发展的欧洲网络安全监管框架将如何影响物联网(IoT)领域。法律分析调查了现有的和拟议的欧盟部门立法是否以及在多大程度上解决了保护物联网及其供应链的多方面挑战。它首先考虑了《网络安全法》,这是欧盟涵盖ICT产品和网络安全服务的最新和相关的法律法案。然后,欧盟产品立法将受到仔细审查。分析的重点是委员会最近根据无线电设备指令(RED)通过的授权法案,加强无线设备的网络安全,医疗器械法规,一般产品安全法规提案和机械法规提案。最后,根据其对物联网网络安全领域的潜在影响,对修订后的网络和信息系统指令(NIS2)提案进行了评估。在此背景下,文章最后主张需要对连接产品的网络安全进行单独的横向立法。为了避免欧盟单一市场的分裂,横向法律行为应基于新立法框架的原则,对所有物联网部门和产品类别提出事前和事后网络安全要求。
{"title":"The IoT and the new EU cybersecurity regulatory landscape","authors":"P. G. Chiara","doi":"10.1080/13600869.2022.2060468","DOIUrl":"https://doi.org/10.1080/13600869.2022.2060468","url":null,"abstract":"ABSTRACT This article aims to cast light on how the fast-evolving European cybersecurity regulatory framework would impact the Internet of Things (IoT) domain. The legal analysis investigates whether and to what extent existing and proposed sectoral EU legislation addresses the manifold challenges in securing IoT and its supply chain. It firstly takes into account the Cybersecurity Act, being the most recent and relevant EU legal act covering ICT products and cybersecurity services. Then, EU product legislation is scrutinised. The analysis focuses on the delegated act recently adopted by the Commission under the Radio Equipment Directive (RED), strengthening wireless devices’ cybersecurity, the Medical Devices Regulation, the Proposal for a General Product Safety Regulation and the Proposal for a Machinery Regulation. Lastly, the proposal for a revised Network and Information Systems Directive (NIS2) is assessed in terms of its potential impact on the field of IoT cybersecurity. Against this backdrop, the article concludes by advocating the need for a separate horizontal legislation on cybersecurity for connected products. To avoid fragmentation of the EU's Single Market, a horizontal legal act should be based on the principles of the New Legislative Framework, with ex-ante and ex-post cybersecurity requirements for all IoT sectors and products categories.","PeriodicalId":53660,"journal":{"name":"International Review of Law, Computers and Technology","volume":"11 2 1","pages":"118 - 137"},"PeriodicalIF":0.0,"publicationDate":"2022-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78341404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Tempting the Fate of the furious: cyber security and autonomous cars 试探愤怒者的命运:网络安全和自动驾驶汽车
Q1 Social Sciences Pub Date : 2022-05-04 DOI: 10.1080/13600869.2022.2060466
S. McLachlan, Burkhard Schafer, Kudakwashe Dube, E. Kyrimi, N. Fenton
ABSTRACT The United Nations Economic Commission for Europe (UN ECE) has developed new aspects of its WP.29 agreement for harmonising vehicle regulations, focusing on the regulation of vehicle manufacturers’ approaches to ensuring vehicle cyber security by requiring implementation of an approved cyber security management system (CSMS). This paper investigates the background, framework and content of WP.29’s cyber security regulation. We provide an overall description of the processes required to become certified, discuss key gaps, issues and the impacts of implementation on stakeholders, and provide recommendations for manufacturers and the authorities who will oversee the operation. Putting the discussion into a broader theoretical framework on risk certification, we explore to the role of non-academic sources to shape public risk perception and to drive, for better or worse, legislative responses.
联合国欧洲经济委员会(UN ECE)制定了其WP.29协议的新方面,以协调车辆法规,重点是通过要求实施经批准的网络安全管理系统(csm)来监管车辆制造商确保车辆网络安全的方法。本文研究了WP.29网络安全监管的背景、框架和内容。我们提供认证所需流程的总体描述,讨论关键差距、问题和实施对利益相关者的影响,并为制造商和监督操作的当局提供建议。将讨论置于更广泛的风险认证理论框架中,我们探讨了非学术来源在塑造公众风险认知和推动立法反应方面的作用,无论好坏。
{"title":"Tempting the Fate of the furious: cyber security and autonomous cars","authors":"S. McLachlan, Burkhard Schafer, Kudakwashe Dube, E. Kyrimi, N. Fenton","doi":"10.1080/13600869.2022.2060466","DOIUrl":"https://doi.org/10.1080/13600869.2022.2060466","url":null,"abstract":"ABSTRACT The United Nations Economic Commission for Europe (UN ECE) has developed new aspects of its WP.29 agreement for harmonising vehicle regulations, focusing on the regulation of vehicle manufacturers’ approaches to ensuring vehicle cyber security by requiring implementation of an approved cyber security management system (CSMS). This paper investigates the background, framework and content of WP.29’s cyber security regulation. We provide an overall description of the processes required to become certified, discuss key gaps, issues and the impacts of implementation on stakeholders, and provide recommendations for manufacturers and the authorities who will oversee the operation. Putting the discussion into a broader theoretical framework on risk certification, we explore to the role of non-academic sources to shape public risk perception and to drive, for better or worse, legislative responses.","PeriodicalId":53660,"journal":{"name":"International Review of Law, Computers and Technology","volume":"358 1","pages":"181 - 201"},"PeriodicalIF":0.0,"publicationDate":"2022-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77002320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Monograph review: Internet of Things and the Law 专著综述:物联网与法律
Q1 Social Sciences Pub Date : 2022-05-04 DOI: 10.1080/13600869.2022.2094579
Felipe Romero-Moreno
Dr Guido Noto La Diega ’ s monograph Internet of Things and the Law attempts to answer an overarching but crucial research question: ‘ how does the law mediate the power dynamics between IoT big tech and the end users and can the law steer the development of the IoT in a human-centric and societally bene fi cial direction? ’ . The author ’ s thesis – or main argument – is that alongside privacy and security, the key topic i.e. the Internet of Things (IoT) poses a threat to other fundamental values, from equality and freedom of expression to self-determi-nation through dignity. fi lling
Guido Noto La Diega博士的专著《物联网与法律》(Internet of Things and the Law)试图回答一个重要但至关重要的研究问题:“法律如何调解物联网大技术和最终用户之间的权力动态?法律能否引导物联网朝着以人为本、有利于社会的方向发展?””。作者的论点或主要论点是,除了隐私和安全之外,物联网(IoT)这个关键话题对其他基本价值观构成了威胁,从平等和言论自由到通过尊严进行的自决。fi告诉
{"title":"Monograph review: Internet of Things and the Law","authors":"Felipe Romero-Moreno","doi":"10.1080/13600869.2022.2094579","DOIUrl":"https://doi.org/10.1080/13600869.2022.2094579","url":null,"abstract":"Dr Guido Noto La Diega ’ s monograph Internet of Things and the Law attempts to answer an overarching but crucial research question: ‘ how does the law mediate the power dynamics between IoT big tech and the end users and can the law steer the development of the IoT in a human-centric and societally bene fi cial direction? ’ . The author ’ s thesis – or main argument – is that alongside privacy and security, the key topic i.e. the Internet of Things (IoT) poses a threat to other fundamental values, from equality and freedom of expression to self-determi-nation through dignity. fi lling","PeriodicalId":53660,"journal":{"name":"International Review of Law, Computers and Technology","volume":"1 1","pages":"306 - 308"},"PeriodicalIF":0.0,"publicationDate":"2022-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83344534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tracing technological boundaries: law, technology, and compliance? 追踪技术边界:法律、技术和遵从性?
Q1 Social Sciences Pub Date : 2022-05-01 DOI: 10.1080/13600869.2022.2060470
Dinusha Mendis, Kim Barker, Karen Mc Cullagh
This issue of the International Review of Law, Computers & Technology presents some current and innovative papers from the 2021 annual BILETA conference on the theme: ‘Taken by surprise: (Re)constituting the critical in an age of digital and pandemic’. The conference was hosted online for a second year due to the ongoing global pandemic. While not the same as a ‘face-to-face’ event, it did the BILETA community proud and benefitted not only from the conference organiser, Prof Paul Maharg’s wealth of experience in using technology for legal education purposes but also Kirsty Melvin’s wizardry in facilitating the conference. For example, the conference organisers provided a social hangout space where conversations about papers continued in breaks, and new and veteran attendees alike connected and re-connected. Speaking of veterans, the Guest Editors and BILETA members take this opportunity to pay tribute to Dr Ken Russell, who sadly passed away in 2021. Ken was a stalwart of the BILETA community, a regular attendee at the annual conference and a very supportive editor, always encouraging young scholars to submit articles for publication in this journal. His loss is profound, and he is sorely missed; however, his legacy and contribution to technology and legal education will live on within BILETA and beyond, in the years to come. The papers in this special issue – edited by Prof Dinusha Mendis, Dr Kim Barker & Dr Karen Mc Cullagh – reflect that spirit, bringing together a selection of the excellent research papers presented at the 2021 conference. As the 2021 conference call stated:
本期《法律、计算机与技术国际评论》介绍了2021年BILETA年度会议上的一些最新和创新论文,主题是:“出乎意料:(重新)构成数字和流行病时代的关键”。由于持续的全球大流行,该会议第二年在线举办。虽然这与“面对面”的会议不同,但令BILETA社区感到自豪的是,会议的组织者Paul Maharg教授在运用科技进行法律教育方面的丰富经验,以及Kirsty Melvin在推动会议方面的魔法,都使会议受益匪浅。例如,会议组织者提供了一个社交场所,在休息时间继续讨论论文,新老与会者都可以联系和重新联系。说到退伍军人,嘉宾编辑和BILETA会员借此机会向Ken Russell博士致敬,他于2021年不幸去世。Ken是BILETA社区的忠实拥护者,定期参加年会,也是一位非常支持的编辑,总是鼓励年轻学者提交文章在该杂志上发表。他的损失是巨大的,人们深深地怀念他;然而,在未来的岁月里,他对技术和法律教育的遗产和贡献将在BILETA内外继续存在。本期特刊中的论文——由Dinusha Mendis教授、Kim Barker博士和Karen Mc Cullagh博士编辑——反映了这种精神,汇集了2021年会议上发表的优秀研究论文。正如2021年的电话会议所述:
{"title":"Tracing technological boundaries: law, technology, and compliance?","authors":"Dinusha Mendis, Kim Barker, Karen Mc Cullagh","doi":"10.1080/13600869.2022.2060470","DOIUrl":"https://doi.org/10.1080/13600869.2022.2060470","url":null,"abstract":"This issue of the International Review of Law, Computers & Technology presents some current and innovative papers from the 2021 annual BILETA conference on the theme: ‘Taken by surprise: (Re)constituting the critical in an age of digital and pandemic’. The conference was hosted online for a second year due to the ongoing global pandemic. While not the same as a ‘face-to-face’ event, it did the BILETA community proud and benefitted not only from the conference organiser, Prof Paul Maharg’s wealth of experience in using technology for legal education purposes but also Kirsty Melvin’s wizardry in facilitating the conference. For example, the conference organisers provided a social hangout space where conversations about papers continued in breaks, and new and veteran attendees alike connected and re-connected. Speaking of veterans, the Guest Editors and BILETA members take this opportunity to pay tribute to Dr Ken Russell, who sadly passed away in 2021. Ken was a stalwart of the BILETA community, a regular attendee at the annual conference and a very supportive editor, always encouraging young scholars to submit articles for publication in this journal. His loss is profound, and he is sorely missed; however, his legacy and contribution to technology and legal education will live on within BILETA and beyond, in the years to come. The papers in this special issue – edited by Prof Dinusha Mendis, Dr Kim Barker & Dr Karen Mc Cullagh – reflect that spirit, bringing together a selection of the excellent research papers presented at the 2021 conference. As the 2021 conference call stated:","PeriodicalId":53660,"journal":{"name":"International Review of Law, Computers and Technology","volume":"47 2 1","pages":"92 - 94"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76399558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Remote justice: information rights as a tool of empowerment 远程司法:作为赋权工具的信息权利
Q1 Social Sciences Pub Date : 2022-04-15 DOI: 10.1080/13600869.2022.2060465
M. Egan
ABSTRACT The coronavirus pandemic has resulted in a compulsory retreat from public spaces. While, for some, this displacement has brought about engagement with digital technologies in new and interesting ways, for others, digital technologies have proved to be the site of technology-facilitated abuse (TFA). Consequently, there are renewed calls for regulation of TFA, with a great deal of this discussion focussing on the design and enforcement of criminal law. However, the scope of behaviour perpetrated with, or through, digital technologies is much broader and demands a range of responses that offer access to justice. This paper argues information rights offer significant potential to enable victims/survivors to gain control over personal information, feel empowered, and improve their mental health and wellbeing. First, it defines information rights and how they are accessed from an EU perspective. Second, it addresses the relationship between legal rights and empowerment in this context. It reflects on if, and how, information rights have been used within the UK specifically, to provide reflections on harnessing their potential. And lastly, explores the viability of advocacy in this area.
冠状病毒大流行导致人们被迫退出公共场所。虽然,对一些人来说,这种取代带来了与数字技术以新的和有趣的方式接触,但对其他人来说,数字技术已被证明是技术促进滥用的场所(TFA)。因此,重新出现了对TFA进行监管的呼声,其中大量讨论集中在刑法的设计和执行上。然而,利用或通过数字技术犯下的行为范围要广泛得多,需要采取一系列应对措施,提供诉诸司法的途径。本文认为,信息权提供了巨大的潜力,使受害者/幸存者能够获得对个人信息的控制,感到被授权,并改善他们的心理健康和福祉。首先,它从欧盟的角度定义了信息权以及如何获得信息权。其次,在此背景下,它解决了法律权利与授权之间的关系。它反映了信息权利是否以及如何在英国被具体使用,以提供利用其潜力的思考。最后,探讨了在这一领域倡导的可行性。
{"title":"Remote justice: information rights as a tool of empowerment","authors":"M. Egan","doi":"10.1080/13600869.2022.2060465","DOIUrl":"https://doi.org/10.1080/13600869.2022.2060465","url":null,"abstract":"ABSTRACT The coronavirus pandemic has resulted in a compulsory retreat from public spaces. While, for some, this displacement has brought about engagement with digital technologies in new and interesting ways, for others, digital technologies have proved to be the site of technology-facilitated abuse (TFA). Consequently, there are renewed calls for regulation of TFA, with a great deal of this discussion focussing on the design and enforcement of criminal law. However, the scope of behaviour perpetrated with, or through, digital technologies is much broader and demands a range of responses that offer access to justice. This paper argues information rights offer significant potential to enable victims/survivors to gain control over personal information, feel empowered, and improve their mental health and wellbeing. First, it defines information rights and how they are accessed from an EU perspective. Second, it addresses the relationship between legal rights and empowerment in this context. It reflects on if, and how, information rights have been used within the UK specifically, to provide reflections on harnessing their potential. And lastly, explores the viability of advocacy in this area.","PeriodicalId":53660,"journal":{"name":"International Review of Law, Computers and Technology","volume":"73 1","pages":"202 - 222"},"PeriodicalIF":0.0,"publicationDate":"2022-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88507309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
There and back again: how target market determination obligations for financial products may incentivise consumer data profiling 再来一遍:金融产品的目标市场确定义务如何激励消费者数据分析
Q1 Social Sciences Pub Date : 2022-04-08 DOI: 10.1080/13600869.2022.2060469
Z. Bednarz
ABSTRACT Increasingly precise data profiling of consumers is one of the drivers of profit for the financial industry in the digital age. However, data profiling may also bring about harm to consumers, ranging from data breaches to unfair pricing, digital manipulation, discrimination and exclusion of vulnerable consumers, which is particularly problematic in financial services context due to the consequences it has on consumers’ access to financial products. The focus of this article are target market determination (TMD) obligations for financial products and their interplay with data protection rules. It asks if financial product governance rules, requiring TMD and distribution of products within the target market, may further incentivise data profiling of consumers by financial services providers. I analyse this issue looking at two sets of rules applicable to financial firms in Australia: (1) the new financial products governance rules, which came into force in October 2021, and (2) the data protection rules: Australian Privacy Act 1988 and the GDPR. If these frameworks fail to strike a balance between (surprisingly) competing interests of consumer protection regarding the provision of appropriate financial products and the use of consumers’ data in digital profiling, the new rules may backfire, resulting in unintended consumer harms.
越来越精确的消费者数据分析是数字时代金融行业利润的驱动因素之一。然而,数据分析也可能给消费者带来伤害,从数据泄露到不公平定价、数字操纵、歧视和排斥弱势消费者,这在金融服务领域尤其成问题,因为它会对消费者获得金融产品产生影响。本文的重点是金融产品的目标市场确定(TMD)义务及其与数据保护规则的相互作用。报告提出,要求TMD和产品在目标市场内分销的金融产品治理规则,是否会进一步激励金融服务提供商对消费者进行数据分析。我分析了这个问题,看看适用于澳大利亚金融公司的两套规则:(1)新的金融产品治理规则,于2021年10月生效,以及(2)数据保护规则:1988年澳大利亚隐私法和GDPR。如果这些框架不能(令人惊讶地)在提供适当的金融产品和在数字分析中使用消费者数据方面的消费者保护利益之间取得平衡,新规则可能会适得其反,导致意想不到的消费者伤害。
{"title":"There and back again: how target market determination obligations for financial products may incentivise consumer data profiling","authors":"Z. Bednarz","doi":"10.1080/13600869.2022.2060469","DOIUrl":"https://doi.org/10.1080/13600869.2022.2060469","url":null,"abstract":"ABSTRACT Increasingly precise data profiling of consumers is one of the drivers of profit for the financial industry in the digital age. However, data profiling may also bring about harm to consumers, ranging from data breaches to unfair pricing, digital manipulation, discrimination and exclusion of vulnerable consumers, which is particularly problematic in financial services context due to the consequences it has on consumers’ access to financial products. The focus of this article are target market determination (TMD) obligations for financial products and their interplay with data protection rules. It asks if financial product governance rules, requiring TMD and distribution of products within the target market, may further incentivise data profiling of consumers by financial services providers. I analyse this issue looking at two sets of rules applicable to financial firms in Australia: (1) the new financial products governance rules, which came into force in October 2021, and (2) the data protection rules: Australian Privacy Act 1988 and the GDPR. If these frameworks fail to strike a balance between (surprisingly) competing interests of consumer protection regarding the provision of appropriate financial products and the use of consumers’ data in digital profiling, the new rules may backfire, resulting in unintended consumer harms.","PeriodicalId":53660,"journal":{"name":"International Review of Law, Computers and Technology","volume":"16 1","pages":"138 - 160"},"PeriodicalIF":0.0,"publicationDate":"2022-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81261699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the path to the future: mapping the notion of transparency in the EU regulatory framework for AI 在通往未来的道路上:在欧盟人工智能监管框架中绘制透明度的概念
Q1 Social Sciences Pub Date : 2022-04-08 DOI: 10.1080/13600869.2022.2060471
Ida Varošanec
ABSTRACT Transparency is the currency of trust. It offers clarity and certainty. This is essential when dealing with intelligent systems which are increasingly making impactful decisions. Such decisions need to be sufficiently explained. With the goal of establishing ‘trustworthy AI’, the European Commission has recently published a legislative proposal for AI. However, there are important gaps in this framework which have not yet been addressed. This article identifies these gaps through a systematic overview of transparency considerations therein. Since transparency is an important means to improve procedural rights, this article argues that the AI Act should contain clear transparency obligations to avoid asymmetries and enable the explainability of automated decisions to those affected by them. The transparency framework in the proposed AI Act leaves open a risk of abuse by companies because their interests do not encompass considerations of AI systems’ ultimate impact on individuals. However, the dangers of keeping transparency as a value without a legal force justify further reflection when regulating AI systems in a way that aims to safeguard opposing interests. To this end, this article proposes inclusive co-regulation instead of self-regulation so that impacted individuals as well as innovators will be empowered to use and trust AI systems.
透明是信任的货币。它提供了清晰和确定性。这在处理智能系统时至关重要,因为智能系统正在做出越来越有影响力的决策。这样的决定需要得到充分的解释。为了建立“可信赖的人工智能”,欧盟委员会最近发布了一项关于人工智能的立法提案。然而,这一框架中还存在一些尚未解决的重要差距。本文通过系统地概述其中的透明度考虑因素来识别这些差距。由于透明度是提高程序性权利的重要手段,本文认为,人工智能法案应包含明确的透明度义务,以避免不对称,并使自动决策能够向受其影响的人解释。拟议的《人工智能法案》中的透明度框架给公司带来了滥用的风险,因为它们的利益不包括考虑人工智能系统对个人的最终影响。然而,在以一种旨在保护对立利益的方式监管人工智能系统时,保持透明度作为一种价值而没有法律效力的危险,值得进一步反思。为此,本文提出了包容性的共同监管,而不是自我监管,以便受影响的个人和创新者将有权使用和信任人工智能系统。
{"title":"On the path to the future: mapping the notion of transparency in the EU regulatory framework for AI","authors":"Ida Varošanec","doi":"10.1080/13600869.2022.2060471","DOIUrl":"https://doi.org/10.1080/13600869.2022.2060471","url":null,"abstract":"ABSTRACT Transparency is the currency of trust. It offers clarity and certainty. This is essential when dealing with intelligent systems which are increasingly making impactful decisions. Such decisions need to be sufficiently explained. With the goal of establishing ‘trustworthy AI’, the European Commission has recently published a legislative proposal for AI. However, there are important gaps in this framework which have not yet been addressed. This article identifies these gaps through a systematic overview of transparency considerations therein. Since transparency is an important means to improve procedural rights, this article argues that the AI Act should contain clear transparency obligations to avoid asymmetries and enable the explainability of automated decisions to those affected by them. The transparency framework in the proposed AI Act leaves open a risk of abuse by companies because their interests do not encompass considerations of AI systems’ ultimate impact on individuals. However, the dangers of keeping transparency as a value without a legal force justify further reflection when regulating AI systems in a way that aims to safeguard opposing interests. To this end, this article proposes inclusive co-regulation instead of self-regulation so that impacted individuals as well as innovators will be empowered to use and trust AI systems.","PeriodicalId":53660,"journal":{"name":"International Review of Law, Computers and Technology","volume":"47 1","pages":"95 - 117"},"PeriodicalIF":0.0,"publicationDate":"2022-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81631442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Connected and vulnerable: cybersecurity in vehicles 互联和脆弱:车辆网络安全
Q1 Social Sciences Pub Date : 2022-04-04 DOI: 10.1080/13600869.2022.2060472
N. Vellinga
ABSTRACT Back in 2015, two hackers hacked a Jeep Cherokee, wirelessly gaining access to the controls of the vehicle through the vehicle’s entertainment system. The hackers slowed the vehicle down on a highway. Remarkably, this did not result in accidents. This did, however, illustrate the already existing cybersecurity risks of vehicles and their threat to road safety, thereby making legislators aware of these dangers. Recently, several legislative steps were made to improve the cybersecurity in vehicles. As cybersecurity enters the realm of road safety, it is necessary to identify the key principles for cybersecurity in vehicles. The current legal framework is discussed in light of these principles, identifying gaps in the current legal framework for cybersecurity in vehicles. As this contribution argues, the focus of the current legislative measures focuses predominantly on the ‘first line of defence’. These measures aim to prevent unauthorised access to the vehicle’s systems, but fail to identify the steps necessary to limit the damage that can be done if this first line of defence is breached and unauthorised access is gained. Moreover, other identified cybersecurity principles are not adequately ensured. In addition, the fragmentation of the current legal framework in itself gives rise to concerns.
早在2015年,两名黑客就入侵了一辆吉普切诺基,通过车载娱乐系统无线进入车辆的控制系统。黑客让汽车在高速公路上减速。值得注意的是,这并没有导致事故。然而,这确实说明了车辆已经存在的网络安全风险及其对道路安全的威胁,从而使立法者意识到这些危险。最近,政府采取了几项立法措施来改善车辆的网络安全。随着网络安全进入道路安全领域,有必要确定车辆网络安全的关键原则。根据这些原则讨论了当前的法律框架,确定了当前车辆网络安全法律框架中的空白。正如本文所述,当前立法措施的重点主要集中在“第一道防线”上。这些措施旨在防止对车辆系统的未经授权的访问,但未能确定必要的步骤,以限制如果这第一道防线被破坏并获得未经授权的访问可能造成的损害。此外,其他已确定的网络安全原则没有得到充分保障。此外,目前法律框架本身的支离破碎令人关切。
{"title":"Connected and vulnerable: cybersecurity in vehicles","authors":"N. Vellinga","doi":"10.1080/13600869.2022.2060472","DOIUrl":"https://doi.org/10.1080/13600869.2022.2060472","url":null,"abstract":"ABSTRACT Back in 2015, two hackers hacked a Jeep Cherokee, wirelessly gaining access to the controls of the vehicle through the vehicle’s entertainment system. The hackers slowed the vehicle down on a highway. Remarkably, this did not result in accidents. This did, however, illustrate the already existing cybersecurity risks of vehicles and their threat to road safety, thereby making legislators aware of these dangers. Recently, several legislative steps were made to improve the cybersecurity in vehicles. As cybersecurity enters the realm of road safety, it is necessary to identify the key principles for cybersecurity in vehicles. The current legal framework is discussed in light of these principles, identifying gaps in the current legal framework for cybersecurity in vehicles. As this contribution argues, the focus of the current legislative measures focuses predominantly on the ‘first line of defence’. These measures aim to prevent unauthorised access to the vehicle’s systems, but fail to identify the steps necessary to limit the damage that can be done if this first line of defence is breached and unauthorised access is gained. Moreover, other identified cybersecurity principles are not adequately ensured. In addition, the fragmentation of the current legal framework in itself gives rise to concerns.","PeriodicalId":53660,"journal":{"name":"International Review of Law, Computers and Technology","volume":"58 1","pages":"161 - 180"},"PeriodicalIF":0.0,"publicationDate":"2022-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89957861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Obituary for Ken Russell 肯·拉塞尔的讣告
Q1 Social Sciences Pub Date : 2022-03-27 DOI: 10.1080/13600869.2022.2056324
Richard Jones
Ken Russell, editor of this International Review for thirty years, died peacefully in October. After qualifying as a teacher Ken’s research led him to become a renowned criminologist working in areas involving police complaints and the role of technology in the criminal justice system, particularly the legal issues in and around the electronic tagging of individuals. An interest that made him the perfect fit for the Review. He will be remembered as the person who has quietly and efficiently been at the head of the journal for almost thirty years. Joining the journal as an associate editor at its inception in 1984, Ken has, in consequence, always been part of the Review. On becoming editor in 1989 on the retirement of Prof. Chris Arnold he was instrumental, in the journal’s early years, in establishing the journal on a sound publishing footing, then in the 1990s transitioning from a yearbook to a multi-edition journal. Recently he has overseen the incorporation of the journal into the age of electronic publishing. Throughout this time, Ken maintained the journal’s close relationship with BILETA, the professional organisation of academic lawyers, ensuring the publication of world-leading proceedings from the annual BILETA conference. Ken maintained his BILETA membership and was a regular attendee at conferences. He was always keen to engage in informed debate with his academic peers, something that he developed as a local politician. His lasting legacy will be that he moved and adapted the journal to the changing landscape that is the interaction of law, computers and technology. It is too easy to underestimate this transition. A brief foray into the journal’s early editions illustrates how significant the landscape has changed. Early pioneers in the discipline were often or worked with computer scientists examining the role of technology in the practice of law, and it’s teaching. Articles abounded on information retrieval, expert and teaching systems. Technology specialists now carry the mantle of system development and implementation whilst academic and practising lawyers moved to focus on the law and its interaction with the technology. Ken came from a poor background in Brierley Hill in England’s Black Country. He won a scholarship to grammar school, where he first developed his lifelong love of rugby. A man of many parts, in addition to his academic life, he was, for all his life, an active participant in local and national politics, being a local councillor in his hometown and then in his adopted town of Glenfield. He fought two parliamentary elections in Edgbaston and Shrewsbury. He established a news agency coordinating activities around his beloved rugby, became the rugby correspondent to the Sunday Telegraph and founded his local paper Glenfield Gazette. He also wrote extensively on local history. He is survived by his wife Nichola and son Anthony and leaves his daughter Nicola, son Simon, three grandchildren and four great-grandchildren
肯·罗素,担任《国际评论》编辑30年,于10月安详去世。在获得教师资格后,肯的研究使他成为一名著名的犯罪学家,研究领域涉及警察投诉和技术在刑事司法系统中的作用,特别是个人电子标签及其周围的法律问题。这种兴趣使他成为《评论》的最佳人选。他将作为一个安静而高效地领导《华尔街日报》近30年的人而被人们铭记。1984年作为副编辑加入该杂志,因此,Ken一直是《评论》的一部分。1989年,在Chris Arnold教授退休后,他成为了杂志的编辑,在杂志的早期建立了一个良好的出版基础,然后在20世纪90年代从年鉴向多版本期刊过渡。最近,他负责将该期刊纳入电子出版时代。在此期间,Ken与BILETA(学术律师的专业组织)保持着密切的关系,确保了BILETA年度会议发表世界领先的会议记录。肯保持他的BILETA会员资格,并定期出席会议。他总是热衷于与他的学术同行进行见多识广的辩论,这是他作为一名当地政治家培养出来的。他留下的不朽遗产将是,他使《华尔街日报》适应了法律、计算机和技术相互作用的不断变化的环境。人们很容易低估这种转变。对该杂志早期版本的简短浏览表明,形势发生了多么重大的变化。该学科的早期先驱经常或与计算机科学家一起研究技术在法律实践中的作用,以及它的教学。关于信息检索、专家系统和教学系统的文章很多。技术专家现在承担着系统开发和实施的重任,而学术和执业律师则将重点放在法律及其与技术的互动上。肯来自英格兰黑人地区布里尔利山的一个贫穷家庭。他获得了文法学校的奖学金,在那里他第一次养成了对橄榄球的终身热爱。作为一个多才多艺的人,除了他的学术生涯之外,他一生都积极参与地方和国家政治,在他的家乡和他的第二故乡格伦菲尔德担任地方议员。他在埃德巴斯顿和什鲁斯伯里参加了两次议会选举。他成立了一家新闻机构,协调有关他所热爱的橄榄球的活动,成为《星期日电讯报》的橄榄球记者,并创办了自己的地方报纸《格伦菲尔德公报》。他还写了大量关于当地历史的文章。他留下了妻子尼古拉和儿子安东尼,女儿尼古拉,儿子西蒙,三个孙子和四个曾孙。
{"title":"Obituary for Ken Russell","authors":"Richard Jones","doi":"10.1080/13600869.2022.2056324","DOIUrl":"https://doi.org/10.1080/13600869.2022.2056324","url":null,"abstract":"Ken Russell, editor of this International Review for thirty years, died peacefully in October. After qualifying as a teacher Ken’s research led him to become a renowned criminologist working in areas involving police complaints and the role of technology in the criminal justice system, particularly the legal issues in and around the electronic tagging of individuals. An interest that made him the perfect fit for the Review. He will be remembered as the person who has quietly and efficiently been at the head of the journal for almost thirty years. Joining the journal as an associate editor at its inception in 1984, Ken has, in consequence, always been part of the Review. On becoming editor in 1989 on the retirement of Prof. Chris Arnold he was instrumental, in the journal’s early years, in establishing the journal on a sound publishing footing, then in the 1990s transitioning from a yearbook to a multi-edition journal. Recently he has overseen the incorporation of the journal into the age of electronic publishing. Throughout this time, Ken maintained the journal’s close relationship with BILETA, the professional organisation of academic lawyers, ensuring the publication of world-leading proceedings from the annual BILETA conference. Ken maintained his BILETA membership and was a regular attendee at conferences. He was always keen to engage in informed debate with his academic peers, something that he developed as a local politician. His lasting legacy will be that he moved and adapted the journal to the changing landscape that is the interaction of law, computers and technology. It is too easy to underestimate this transition. A brief foray into the journal’s early editions illustrates how significant the landscape has changed. Early pioneers in the discipline were often or worked with computer scientists examining the role of technology in the practice of law, and it’s teaching. Articles abounded on information retrieval, expert and teaching systems. Technology specialists now carry the mantle of system development and implementation whilst academic and practising lawyers moved to focus on the law and its interaction with the technology. Ken came from a poor background in Brierley Hill in England’s Black Country. He won a scholarship to grammar school, where he first developed his lifelong love of rugby. A man of many parts, in addition to his academic life, he was, for all his life, an active participant in local and national politics, being a local councillor in his hometown and then in his adopted town of Glenfield. He fought two parliamentary elections in Edgbaston and Shrewsbury. He established a news agency coordinating activities around his beloved rugby, became the rugby correspondent to the Sunday Telegraph and founded his local paper Glenfield Gazette. He also wrote extensively on local history. He is survived by his wife Nichola and son Anthony and leaves his daughter Nicola, son Simon, three grandchildren and four great-grandchildren ","PeriodicalId":53660,"journal":{"name":"International Review of Law, Computers and Technology","volume":"67 1","pages":"91 - 91"},"PeriodicalIF":0.0,"publicationDate":"2022-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88474425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Review of Law, Computers and Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1