Pub Date : 2023-03-07DOI: 10.1007/s44206-023-00034-6
Alexis M. Elder
{"title":"What Confucian Ethics Can Teach Us About Designing Caregiving Robots for Geriatric Patients","authors":"Alexis M. Elder","doi":"10.1007/s44206-023-00034-6","DOIUrl":"https://doi.org/10.1007/s44206-023-00034-6","url":null,"abstract":"","PeriodicalId":72819,"journal":{"name":"Digital society : ethics, socio-legal and governance of digital technology","volume":"31 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84370518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-02-20DOI: 10.1007/s44206-023-00041-7
Jukka Ruohonen, Sini Mickelsson
{"title":"Reflections on the Data Governance Act","authors":"Jukka Ruohonen, Sini Mickelsson","doi":"10.1007/s44206-023-00041-7","DOIUrl":"https://doi.org/10.1007/s44206-023-00041-7","url":null,"abstract":"","PeriodicalId":72819,"journal":{"name":"Digital society : ethics, socio-legal and governance of digital technology","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83081626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-02-13DOI: 10.1007/s44206-023-00035-5
H. Sætra
{"title":"Against the Conflation of Corporate Strategy, Ethics, and the Politics of AI","authors":"H. Sætra","doi":"10.1007/s44206-023-00035-5","DOIUrl":"https://doi.org/10.1007/s44206-023-00035-5","url":null,"abstract":"","PeriodicalId":72819,"journal":{"name":"Digital society : ethics, socio-legal and governance of digital technology","volume":"68 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83187520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.1007/s44206-023-00036-4
Alexander Blanchard, Mariarosaria Taddeo
Intelligence agencies have identified artificial intelligence (AI) as a key technology for maintaining an edge over adversaries. As a result, efforts to develop, acquire, and employ AI capabilities for purposes of national security are growing. This article reviews the ethical challenges presented by the use of AI for augmented intelligence analysis. These challenges have been identified through a qualitative systematic review of the relevant literature. The article identifies five sets of ethical challenges relating to intrusion, explainability and accountability, bias, authoritarianism and political security, and collaboration and classification, and offers a series of recommendations targeted at intelligence agencies to address and mitigate these challenges.
{"title":"The Ethics of Artificial Intelligence for Intelligence Analysis: a Review of the Key Challenges with Recommendations.","authors":"Alexander Blanchard, Mariarosaria Taddeo","doi":"10.1007/s44206-023-00036-4","DOIUrl":"https://doi.org/10.1007/s44206-023-00036-4","url":null,"abstract":"<p><p>Intelligence agencies have identified artificial intelligence (AI) as a key technology for maintaining an edge over adversaries. As a result, efforts to develop, acquire, and employ AI capabilities for purposes of national security are growing. This article reviews the ethical challenges presented by the use of AI for augmented intelligence analysis. These challenges have been identified through a qualitative systematic review of the relevant literature. The article identifies five sets of ethical challenges relating to intrusion, explainability and accountability, bias, authoritarianism and political security, and collaboration and classification, and offers a series of recommendations targeted at intelligence agencies to address and mitigate these challenges.</p>","PeriodicalId":72819,"journal":{"name":"Digital society : ethics, socio-legal and governance of digital technology","volume":"2 1","pages":"12"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10073779/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9272294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.1007/s44206-023-00051-5
Anuj Puri
Contemporary privacy challenges go beyond individual interests and result in collective harms. To address these challenges, this article argues for a collective interest in Mutual Privacy which is based on our shared genetic, social, and democratic interests as well as our common vulnerabilities against algorithmic grouping. On the basis of the shared interests and participatory action required for its cumulative protection, Mutual Privacy is then classified as an aggregate shared participatory public good which is protected through the group right to Mutual Privacy.
{"title":"The Group Right to Mutual Privacy.","authors":"Anuj Puri","doi":"10.1007/s44206-023-00051-5","DOIUrl":"https://doi.org/10.1007/s44206-023-00051-5","url":null,"abstract":"<p><p>Contemporary privacy challenges go beyond individual interests and result in collective harms. To address these challenges, this article argues for a collective interest in Mutual Privacy which is based on our shared genetic, social, and democratic interests as well as our common vulnerabilities against algorithmic grouping. On the basis of the shared interests and participatory action required for its cumulative protection, Mutual Privacy is then classified as an aggregate shared participatory public good which is protected through the group right to Mutual Privacy.</p>","PeriodicalId":72819,"journal":{"name":"Digital society : ethics, socio-legal and governance of digital technology","volume":"2 2","pages":"22"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10243263/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9976416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.1007/s44206-022-00032-0
Rebeca Ferrero Guillén, Altair Breckwoldt Jurado
{"title":"Vagueness in Artificial Intelligence: The 'Fuzzy Logic' of AI-Related Patent Claims","authors":"Rebeca Ferrero Guillén, Altair Breckwoldt Jurado","doi":"10.1007/s44206-022-00032-0","DOIUrl":"https://doi.org/10.1007/s44206-022-00032-0","url":null,"abstract":"","PeriodicalId":72819,"journal":{"name":"Digital society : ethics, socio-legal and governance of digital technology","volume":"50 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85697831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01Epub Date: 2023-05-11DOI: 10.1007/s44206-023-00049-z
Alexandra Giannopoulou
The shift from electronic identification to digital identity is indicative of a broader evolution towards datafication of identity at large. As digital identity emerges from the fringes of technical challenges towards the legal and socio-technical, pre-existing ideologies on the reform of digital identity re-emerge with a newfound enthusiasm. Self-sovereign identity is one representative example of this trend. This paper sets out to uncover the principles, technological design ideas, and underlying guiding ideologies that are attached to self-sovereign identity infrastructures, carrying the promise of user-centricity, self-sovereignty, and individual empowerment. Considering the flourishing of digital identity markets, and the subsequent institutional interest on a European level in the techno-social promises that this identity architecture carries, this paper explores how the implementation of EU-wide self-sovereign identity shifts the already existing historical power balances in the construction of identity infrastructures. In this contribution, we argue that the European-wide adoption of self-sovereign ideals in identity construction does not address the shortcomings that identity and identification have historically faced and that instead of citizen empowerment, it puts individuals (a category broader than citizens) in a rather vulnerabilized position.
{"title":"Digital Identity Infrastructures: a Critical Approach of Self-Sovereign Identity.","authors":"Alexandra Giannopoulou","doi":"10.1007/s44206-023-00049-z","DOIUrl":"10.1007/s44206-023-00049-z","url":null,"abstract":"<p><p>The shift from electronic identification to digital identity is indicative of a broader evolution towards datafication of identity at large. As digital identity emerges from the fringes of technical challenges towards the legal and socio-technical, pre-existing ideologies on the reform of digital identity re-emerge with a newfound enthusiasm. Self-sovereign identity is one representative example of this trend. This paper sets out to uncover the principles, technological design ideas, and underlying guiding ideologies that are attached to self-sovereign identity infrastructures, carrying the promise of user-centricity, self-sovereignty, and individual empowerment. Considering the flourishing of digital identity markets, and the subsequent institutional interest on a European level in the techno-social promises that this identity architecture carries, this paper explores how the implementation of EU-wide self-sovereign identity shifts the already existing historical power balances in the construction of identity infrastructures. In this contribution, we argue that the European-wide adoption of self-sovereign ideals in identity construction does not address the shortcomings that identity and identification have historically faced and that instead of citizen empowerment, it puts individuals (a category broader than citizens) in a rather vulnerabilized position.</p>","PeriodicalId":72819,"journal":{"name":"Digital society : ethics, socio-legal and governance of digital technology","volume":"2 2","pages":"18"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10172062/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9845406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.1007/s44206-023-00033-7
Cristiano Codagnone, Linda Weigl
For about a decade, the concept of 'digital sovereignty' has been prominent in the European policy discourse. In the quest for digital sovereignty, the European Union has adopted a constitutional approach to protect fundamental rights and democratic values, and to ensure fair and competitive digital markets. Thus, 'digital constitutionalism' emerged as a twin discourse. A corollary of these discourses is a third phenomenon resulting from a regulatory externalisation of European law beyond the bloc's borders, the so-called 'Brussels Effect'. The dynamics arising from Europe's digital policy and regulatory activism imply increasing legal complexities. This paper argues that this phenomenon in policy-making is a case of a positive 'policy bubble' characterised by an oversupply of policies and legislative acts. The phenomenon can be explained by the amplification of values in the framing of digital policy issues. To unpack the policy frames and values at stake, this paper provides an overview of the digital policy landscape, followed by a critical assessment to showcase the practical implications of positive policy bubbles.
{"title":"Leading the Charge on Digital Regulation: The More, the Better, or Policy Bubble?","authors":"Cristiano Codagnone, Linda Weigl","doi":"10.1007/s44206-023-00033-7","DOIUrl":"https://doi.org/10.1007/s44206-023-00033-7","url":null,"abstract":"<p><p>For about a decade, the concept of 'digital sovereignty' has been prominent in the European policy discourse. In the quest for digital sovereignty, the European Union has adopted a constitutional approach to protect fundamental rights and democratic values, and to ensure fair and competitive digital markets. Thus, 'digital constitutionalism' emerged as a twin discourse. A corollary of these discourses is a third phenomenon resulting from a regulatory externalisation of European law beyond the bloc's borders, the so-called 'Brussels Effect'. The dynamics arising from Europe's digital policy and regulatory activism imply increasing legal complexities. This paper argues that this phenomenon in policy-making is a case of a positive 'policy bubble' characterised by an oversupply of policies and legislative acts. The phenomenon can be explained by the amplification of values in the framing of digital policy issues. To unpack the policy frames and values at stake, this paper provides an overview of the digital policy landscape, followed by a critical assessment to showcase the practical implications of positive policy bubbles.</p>","PeriodicalId":72819,"journal":{"name":"Digital society : ethics, socio-legal and governance of digital technology","volume":"2 1","pages":"4"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9844176/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"10580101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.1007/s44206-022-00031-1
Annegret Bendiek, Isabella Stuerzer
Anu Bradford has described the European Union's ability to externalise its norms and standards as the so-called Brussels effect. We apply the Brussels effect to select issues discussed via the EU-US Trade and Technology Council (TTC) and show that its capacity to project power stems not only from the EU's market size but also from its domestic decision-making structure. The political capital accumulated in the EU's consensus-based and inclusive deliberations functions as an effective instrument for motivating other states to adopt European regulations, as legislative acts resulting from European inter-institutional and multi-level policy-making hold high standards of legal certainty and signal European strategic goals and political commitments credibly. Knowing that European consensus is an important condition for externalisation, Brussels can facilitate consensus by calling for internal compromise in order to be able to take the European compromise to the international stage. Thus, the internal and external dimensions of the Brussels effect are mutually reinforcing. This twofold appearance demarcates it from the California effect and the Beijing effect.
{"title":"The Brussels Effect, European Regulatory Power and Political Capital: Evidence for Mutually Reinforcing Internal and External Dimensions of the Brussels Effect from the European Digital Policy Debate.","authors":"Annegret Bendiek, Isabella Stuerzer","doi":"10.1007/s44206-022-00031-1","DOIUrl":"https://doi.org/10.1007/s44206-022-00031-1","url":null,"abstract":"<p><p>Anu Bradford has described the European Union's ability to externalise its norms and standards as the so-called Brussels effect. We apply the Brussels effect to select issues discussed via the EU-US Trade and Technology Council (TTC) and show that its capacity to project power stems not only from the EU's market size but also from its domestic decision-making structure. The political capital accumulated in the EU's consensus-based and inclusive deliberations functions as an effective instrument for motivating other states to adopt European regulations, as legislative acts resulting from European inter-institutional and multi-level policy-making hold high standards of legal certainty and signal European strategic goals and political commitments credibly. Knowing that European consensus is an important condition for externalisation, Brussels can facilitate consensus by calling for internal compromise in order to be able to take the European compromise to the international stage. Thus, the internal and external dimensions of the Brussels effect are mutually reinforcing. This twofold appearance demarcates it from the California effect and the Beijing effect.</p>","PeriodicalId":72819,"journal":{"name":"Digital society : ethics, socio-legal and governance of digital technology","volume":"2 1","pages":"5"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9868500/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"10688238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01Epub Date: 2022-12-26DOI: 10.1007/s44206-022-00030-2
Max Tretter
Recently, the concept of sovereignty in the digital has attracted much attention. Several publications dealing with this concept assume that it can best be described as a network of different, overlapping exercises of power. Nevertheless, there is a need for further research on how exactly sovereignty in the digital can be understood. In order to contribute to a better understanding of this concept, I illustrate its complex structure using contact tracing apps as a paradigmatic example. I conduct a narrative review to show what sovereignty looks like in the context of these apps. In the context of digital contact tracing apps, sovereignty is best understood as a complex network of three actors-nations, (big tech) companies, and individuals-that exercise various forms of power against or on behalf of each other to claim sovereignty for themselves and to either weaken or strengthen the sovereignty claims of other actors. Since large parts of the results can be generalized from the particular context of contact tracing apps, they contribute to a better overall understanding of the concept of sovereignty in digital. This might, in turn, be helpful for discussions about this technology as well as about the regulation and governance of the digital in general.
{"title":"Sovereignty in the Digital and Contact Tracing Apps.","authors":"Max Tretter","doi":"10.1007/s44206-022-00030-2","DOIUrl":"10.1007/s44206-022-00030-2","url":null,"abstract":"<p><p>Recently, the concept of sovereignty in the digital has attracted much attention. Several publications dealing with this concept assume that it can best be described as a network of different, overlapping exercises of power. Nevertheless, there is a need for further research on how exactly sovereignty in the digital can be understood. In order to contribute to a better understanding of this concept, I illustrate its complex structure using contact tracing apps as a paradigmatic example. I conduct a narrative review to show what sovereignty looks like in the context of these apps. In the context of digital contact tracing apps, sovereignty is best understood as a complex network of three actors-nations, (big tech) companies, and individuals-that exercise various forms of power against or on behalf of each other to claim sovereignty for themselves and to either weaken or strengthen the sovereignty claims of other actors. Since large parts of the results can be generalized from the particular context of contact tracing apps, they contribute to a better overall understanding of the concept of sovereignty in digital. This might, in turn, be helpful for discussions about this technology as well as about the regulation and governance of the digital in general.</p>","PeriodicalId":72819,"journal":{"name":"Digital society : ethics, socio-legal and governance of digital technology","volume":"2 1","pages":"2"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9791621/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"10467628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}