DC-SIG Involving Schools of Internet Governance in achieving SDGs | IGF 2023

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Audience

During the discussion on Internet governance schools, it was highlighted that these schools strive to build effective, accountable, and inclusive institutions. Institutions like the Internet Engineering Task Force and ICANN were cited as examples of inclusivity and effectiveness in the field of internet governance. Schools of internet governance expose students to different institutional forms, including NGOs that manage standardization or open-source communities.

Another significant aspect of internet governance schools is their role in promoting peace and cultural understanding. By connecting people from different countries, these schools leverage the internet as a tool to combat prejudice and foster peace. The schools invite guests from various countries to demonstrate the world’s diversity and encourage cooperation and mutual understanding.

Furthermore, these educational institutions have the potential to reduce unemployment and empower individuals economically. For instance, the Pakistan School on Internet Governance includes sessions on leveraging the internet for entrepreneurial opportunities, highlighting successful digital initiatives that inspire youth. By training individuals on internet governance and fostering entrepreneurship, these schools contribute to employment generation and economic growth.

In areas with limited internet access, it is crucial to inform local communities about the plans of local operators and regulators. The Pakistan School on Internet Governance, for instance, invites local operators to share their internet access plans, while regulators and government officials inform the audience about their visions and strategies. This knowledge exchange helps bridge the gap in connectivity by ensuring that affected communities are aware of plans to improve access.

The African School on Internet Governance focuses on leadership development, gender equality, and addressing the gender digital divide. This collaborative initiative between Research ICT Africa, the African Union Commission, and the Association for Progressive Communications targets middle to senior management in government, regulators, and civil society. The school aims to provide a platform for women thought leaders, promote African expertise, and address gender-based violence and the digital divide.

Internet governance schools also facilitate discussions on sensitive topics, such as internet shutdowns. By creating an inclusive environment for dialogue, these schools bring together civil society, human rights activists, and government and regulatory representatives from African countries. This enables open and constructive discussions on internet-related issues, including internet shutdowns.

Overall, internet governance schools play a crucial role in building effective institutions, promoting peace and cultural understanding, reducing unemployment, bridging the urban-rural divide, and addressing societal issues. Through education, inclusivity, and dialogue, these schools contribute to the sustainable management of the internet and the achievement of Sustainable Development Goals.

Speaker 1

The Japan School of Internet Governance, which started this year, aims to promote Internet Governance on a larger scale and raise awareness of its importance. An announcement by Toshi from the school showcased its successful launch. Notably, the school conducted a full-day session with youth participants, emphasizing its commitment to engaging the future generation in discussions and decision-making processes regarding internet governance.

To achieve its goals, the school intends to foster information exchange and facilitate meaningful discussions on various topics, including contentious issues like the Manga Pirate Site. These subjects are incorporated into the curriculum, equipping students with the knowledge and skills needed to navigate internet governance and address potential challenges.

The efforts of the Japan School of Internet Governance align with SDG 4: Quality Education and SDG 9: Industry, Innovation, and Infrastructure of the United Nations’ Sustainable Development Goals (SDGs). By focusing on these SDGs, the school contributes to improving the quality of education and promotes the development and innovation required for a robust internet infrastructure.

The establishment of the Japan School of Internet Governance is a significant step towards increasing awareness and understanding of internet governance in Japan. It strives to create a well-informed and proactive society by facilitating dialogue, promoting information exchange, and addressing relevant issues.

In conclusion, the Japan School of Internet Governance, which began its activities this year, seeks to elevate the importance of internet governance and expand its reach. Through its curriculum and initiatives, the school empowers individuals, particularly young participants, by equipping them with the knowledge and skills necessary to navigate the complexities of internet governance. By addressing significant issues such as the Manga Pirate Site, the school demonstrates its commitment to fostering dialogue and nurturing a well-informed society.

Olga Cavalli

During the session, the speakers emphasized the importance of finding connections between internet governance schools and the Sustainable Development Goals (SDGs). Olga Cavalli specifically highlighted the significance of discussing activities related to the SDGs at different schools of internet governance. This highlights the need for these schools to align their work with the broader global agenda of achieving sustainable development.

One of the main topics discussed was the energy consumption of the internet, with predictions suggesting that it will double by 2030. This raises concerns about its environmental impact. It was also highlighted that there are still parts of the world that lack access to electricity, exacerbating energy disparities. The emergence of the Internet of Energy as a new field further emphasizes the need to address energy consumption and sustainability in the context of internet governance.

The schools of internet governance were commended for their role in promoting understanding and action around energy consumption and sustainability. The South School of Internet Governance, in particular, focuses on issues related to energy consumption and its potential impacts, such as climate change. This demonstrates that these schools are not only educating individuals but also becoming platforms for addressing pressing global challenges.

The approach of organizing schools in different cities was endorsed as a means to reach and include diverse communities in the discussions. The Pakistan School on Internet Governance, for example, rotates among different cities, allowing more diverse communities to access education and engage in the dialogue on internet governance.

Efforts to bridge the gap between urban and rural communities were highlighted, particularly by the Bangladeshi School of Internet Governance. The speaker, Ashrafur Rahman, who is a coordinator of the school, mentioned their endeavors to involve rural and transgender communities and promote innovation in rural areas. This showcases the school’s commitment to inclusivity and addressing the digital divide between rural and urban populations.

Another notable aspect of the schools of internet governance is their focus on the SDGs and the integration of the goals into their programs. Olga Cavalli organized a school in Rio with Fundación Getulio Vargas that placed specific emphasis on the SDGs. By incorporating the SDGs into their curriculum, these schools are contributing to the realization of the global goals.

The evolving nature of the schools of internet governance was emphasized, with references to partnerships and collaborations. The Argentina School of Internet Governance was highlighted for partnering with a university to offer certifications from Fortinet, a leading cybersecurity company. Additionally, the production of a document for the Global Digital Compact involving over 80 fellows from around the world further demonstrates the schools’ evolving and expanding role in the field of internet governance.

The schools of internet governance were also recognized for their role in enhancing communication and learning among schools. The usefulness of the dynamic coalition in supporting these endeavors was acknowledged, as it provides materials and helps schools understand the multi-stakeholder model and its evolution. Furthermore, the availability of a website with a map showing the locations of the schools was noted as a means to share and consult information between the schools.

However, the issue of limited time for active participation in these activities was acknowledged by Olga Cavalli herself. This suggests that despite their commitment to internet governance, time constraints can hinder active engagement in these initiatives.

On the positive side, the availability of school content on their YouTube channel in multiple languages serves to disseminate their knowledge and insights to a wider audience. Additionally, students are kept engaged through a telegram group, where they can access fellowship opportunities, job opportunities, research, and news about internet governance. This further strengthens the sense of community and provides students with ongoing learning and development opportunities.

In conclusion, the session highlighted the importance of integrating the works of internet governance schools with the SDGs. The energy consumption of the internet and the need for sustainability were key concerns discussed. The schools of internet governance play a significant role in promoting understanding and action around these issues. They reach diverse communities through their approach of organizing schools in different cities and strive to bridge the gap between urban and rural populations. The schools’ focus on the SDGs and their evolving nature, as well as partnerships and collaborations, contribute to their expanding role in the field of internet governance. Despite time constraints, the schools continue to enhance communication and learning, with the dynamic coalition and the sharing of information and documents through their website. Overall, the session provided valuable insights into the achievements and challenges faced by internet governance schools and their contribution to a more sustainable and inclusive digital future.

Satish Babu

The analysis of the provided statements reveals several key points and arguments made by the speakers. Firstly, Satish Babu is associated with two schools, specifically the Asia Pacific School on Internet Governance and the India School. These schools were founded in 2015 and 2016 respectively, with the purpose of providing capacity building and building awareness in the field of internet governance. The primary function of these schools is to equip individuals with the necessary skills and knowledge to effectively navigate the complexities of internet governance.

Furthermore, it is highlighted that there is a need for schools on internet governance globally. Many countries and regions, including Africa, Asia Pacific, Argentina, Armenia, Chad, Ghana, Europe, North America, Nigeria, Pakistan, and Russia, have already established their own schools in response to this need. These schools serve as platforms for individuals from different parts of the world to convene, collaborate, and share ideas related to internet governance.

Another important aspect discussed is the incorporation of the Sustainable Development Goals (SDGs) into the curricula of these schools. While the two schools that Satish Babu is associated with do not explicitly highlight the SDGs, it is mentioned that the curriculars were developed without considering the SDGs, as they were adopted after the schools were already operational. Nevertheless, Satish finds value in discussing how these schools naturally address many of the SDGs, emphasizing the alignment of their educational programmes with the broader goals of sustainable development.

Satish also advocates for the enhancement of cybersecurity efforts and the development of online education resources. It is emphasized that cybersecurity is a central issue in internet governance, and the Global Forum on Cyber Expertise, as well as the London Process, provide opportunities for African colleagues to engage and address this issue effectively. Additionally, the successful workshops conducted by the schools in collaboration with various stakeholders have led to the development of new projects.

Moreover, the speakers acknowledge the proposal for global schools on internet governance, highlighting that two schools have already evolved from regional to global stages. Satish also emphasizes the importance of content evolution in internet governance education, specifically citing the India School of Internet Governance as an example. The school has made its course content available on their website, demonstrating the journey and evolution of the curriculum over eight years.

In conclusion, the speakers address the importance of quality education, partnerships, and the SDGs in the field of internet governance. The schools on internet governance play a crucial role in building awareness and capacity, and there is a global need for such schools. Satish Babu advocates for the enhancement of cybersecurity efforts, the development of online education resources, and emphasizes the importance of content evolution in internet governance education. The analysis provides valuable insights into the current landscape of internet governance education and the efforts being made to address the challenges and opportunities in this field.

Avri Doria

Avri Doria hosted the Dynamic Coalition on Schools and Internet Governance session, emphasising the importance of education in internet governance and the role of schools in achieving the Sustainable Development Goals (SDGs). The session was divided into three sections: presentations from new schools, discussions on SDGs and the actions schools are taking, and an examination of the objectives of the Dynamic Coalition on Schools.

Despite some participants initially being absent, Avri Doria ensured that the session followed the outlined agenda. She highlighted the dynamic coalition’s significance in supporting schools and promoting governance education. The coalition has developed useful resources for schools, such as documents and materials, to aid learning about governance and the multi-stakeholder model. Avri Doria believes that the dynamic coalition could be an invaluable resource in teaching governance and enhancing understanding of the multi-stakeholder approach.

The session also delved into discussions on the SDGs, specifically focusing on SDG 5 (Gender Equality), SDG 7 (Affordable and Clean Energy), and SDG 16 (Peace, Justice, and Strong Institutions). Avri Doria stressed the importance of addressing these goals within schools and internet governance. This emphasised the need to incorporate the SDGs into school curriculums and promote gender equality, clean energy, and peace and justice within educational institutions.

During the session, Avri Doria highlighted the collaboration between the dynamic coalition and the IGF Secretariat. She suggested the need for a follow-up to evaluate the impact and outcome of this collaboration, examining its success rate and feedback on the collaboration document. Avri Doria believes that additional elements could be included to enhance the effectiveness of the document.

Furthermore, Avri Doria advocated for the use of modern internet standards and global good practices to enhance justified trust in the internet and email. She referred to the Global Forum for Cyber Expertise, which includes a track focused on enhancing justified trust. Avri Doria mentioned the availability of resources and a handbook explaining these modern internet standards and their significance. She considers these resources valuable assets for schools and encourages their use in educational settings.

Additionally, Avri Doria discussed a website aimed at open educational resource sharing for internet governance. The website features a map function and sections dedicated to fellows, faculties, and a dynamic coalition wiki. While only one school has contributed materials thus far, Avri Doria encouraged others to contribute resources in order to enrich the website and promote collaborative learning among different schools.

In conclusion, the session hosted by Avri Doria underscored the importance of education in internet governance and the role of schools in achieving the SDGs. The discussions emphasised the significance of teaching governance, integrating the SDGs into school curriculums, and fostering a deeper understanding of the multi-stakeholder model. The session also highlighted the collaboration between the dynamic coalition and the IGF Secretariat, as well as advocating for the use of modern internet standards and global good practices. The importance of sharing open educational resources for internet governance was also emphasised, promoting collaboration among schools to enhance education in this field.

Sandra Hoferichte

Schools on internet governance play a significant role in promoting gender equality and empowering women. These schools have been successful in attracting a greater number of female participants compared to males, contributing to a more balanced gender representation in this field. For example, the European Summer School on Internet Governance has seen a higher turnout of female participants. These schools provide a comprehensive education that equips young professionals with the necessary knowledge and skills to pursue leadership positions.

However, despite progress in educational initiatives, there is still a lack of advancement in women’s representation in managerial positions in Germany. The proportion of women in managerial roles has only slightly increased from 21% in 2014 to 23% in 2018. Continued efforts are needed to address gender disparities in leadership roles.

To address this issue, more emphasis should be placed on adult education for promoting gender equality. Schools on internet governance can serve as a valuable platform for adult education, helping to bridge the gap and empower women in various aspects of their lives. By providing access to education and empowering women, these schools contribute to the progress towards achieving gender equality, aligned with Sustainable Development Goal 5.

In the context of Sustainable Development Goals (SDGs), Japan has shown greater awareness and promotion compared to Europe. Japanese society demonstrates a visible commitment to SDGs, with initiatives such as displaying SDG symbols on windows and cars. Europe could learn from Japan’s approach and consider adopting similar strategies to raise awareness and garner public support for achieving the SDGs.

Furthermore, it is important to address the limited utilization of digital resources like the wiki and website for global networking. Despite the availability of these platforms and partial funding from the Medienstadt Leipzig association, their usage has been relatively low. Sandra Hoferichte expresses concern over this limited engagement and emphasizes the need for financial support from other schools or organizations to sustain these digital resources and the work of the dynamic coalition. Such support would contribute to the effective dissemination of information and knowledge sharing among a wider network, enabling greater collaboration towards achieving SDGs 4 and 10.

In conclusion, schools on internet governance have proven to be instrumental in promoting gender equality and women’s empowerment. However, there is still work to be done to address the underrepresentation of women in managerial positions in Germany. By embracing adult education and adopting Japan’s approach to SDG awareness, progress can be made towards achieving these goals. Additionally, supporting the wiki and website for global networking through increased funding would enhance their effectiveness in facilitating collaboration and knowledge exchange for the SDGs.

Wolfgang Kleinwaechter

In the analysis, the speakers delve into the multidimensional nature of internet governance and its intersection with education. They emphasize that internet governance encompasses the evolution and use of the internet, covering both the technical and application layers, as well as various public policy issues related to the internet. It is noted that the complex and evolving nature of internet governance makes it difficult to study within a traditional university setting.

The importance of specialized courses in internet governance is highlighted. The speakers point out that new questions and issues have arisen in recent years that were not previously on the agenda. These require accurate understanding, as seen in the example of artificial intelligence (AI) governance. The speaker mentions growing confusion surrounding concepts such as digital governance, AI governance, and cyber governance. This underscores the need for courses that provide clarity to address the evolving landscape.

Furthermore, the speakers stress the significance of academic independence and proactivity in developing educational programs. They advocate for taking inspiration from the global community while also thinking independently about what is beneficial for one’s own country and community. They emphasize the need to be proactive in addressing the challenges and opportunities presented by internet governance.

The analysis also draws attention to the importance of judges with knowledge of internet governance. It is stated that in a world where many conflicts may end up in court, judges without understanding of internet governance may make incorrect decisions. This underscores the need for education and expertise in this area to ensure fair and accurate rulings.

Additionally, the analysis touches upon the topic of cybersecurity and the establishment of the Global Forum for Cyber Expertise. The origins of the Global Forum for Cyber Expertise from the London process are mentioned, with its focus on cybersecurity. It is noted that the Global Forum will be hosting a world conference on capacity building, emphasizing the importance of collaboration and partnerships in addressing cybersecurity challenges.

Overall, the analysis reflects a comprehensive understanding of the importance of education, collaboration, and continuous development of expertise in the field of internet governance. The speakers provide valuable insights, highlighting the multidisciplinary nature of the subject, the need for specialized courses, the significance of academic independence, the role of judges, and the importance of cybersecurity. These observations are crucial for navigating the complexities of internet governance and addressing its challenges effectively.

Alexander Isavnin

The analysis examines various arguments and stances on different topics, addressing issues such as internet governance schools, travel and international exposure, Russia’s societal norms, the obscurity of UN processes, access to water and healthcare, the government’s decision-making, and the perceived obscurity of certain Sustainable Development Goals (SDGs).

One argument posits that internet governance schools can contribute to the development of effective and inclusive institutions. It highlights the importance of including diverse stakeholders, with the Internet Corporation for Assigned Names and Numbers (ICANN) serving as an example. This argument stresses the need for governance frameworks that accommodate different perspectives and foster collaboration.

Another argument emphasises how travel and international exposure promote understanding and peace. It cites a quote from Mark Twain, asserting that travel has the power to eradicate prejudice, bigotry, and narrow-mindedness. The widespread availability of the internet is also seen as a means to bring diverse experiences from different countries into people’s homes, further enhancing global understanding.

In contrast, a negative stance suggests that Russia is slowly reverting to its old societal norms. However, the analysis lacks specific supporting facts for this claim, making it somewhat speculative.

Furthermore, concerns are raised regarding the obscurity of UN processes in the Russian Federation. It is highlighted that these processes are not widely publicised and are considered opaque by the local population, thus raising questions about transparency and accessibility.

On a positive note, the analysis acknowledges that Russia generally has good access to water and healthcare, attributing this to the legacy of the Soviet Union, which laid a solid foundation in these areas.

A negative argument contends that the government may hold the belief that certain actions should not be taken in other areas. However, no specific evidence is provided to support this claim, leaving it open to interpretation.

The analysis also notes the perception of certain SDGs, specifically the 9th and 16th goals, as being obscure. However, without specific details or evidence, this argument lacks substance.

In addition, the analysis highlights a dedicated course aimed at explaining UN processes and SDGs. This course aims to provide information to attendees, ensuring they are well-informed and understand the objectives behind the SDGs and the workings of the United Nations.

In conclusion, the analysis covers a range of arguments and stances on various topics. While some points are supported by evidence, others lack specificity or supporting facts. The analysis provides insights into the significance of internet governance schools, travel and international exposure, concerns about the obscurity of UN processes and certain SDGs, access to water and healthcare, and the government’s decision-making. The course dedicated to explaining UN processes and SDGs is seen as a valuable resource for enhancing understanding in this field.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

DC3 Community Networks: Digital Sovereignty and Sustainability | IGF 2023

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Audience

In marginalized and conflict-ridden areas like favelas in Rio de Janeiro, Brazil, telecom operators do not provide internet or telephony services due to security concerns. This lack of connectivity has become even more pronounced during the pandemic, making it increasingly challenging for residents to access vital resources and opportunities. However, community networks present a potential solution to connect these marginalized communities and offer alternatives.

Building antennas for community networks was initially considered as a viable option for providing internet access in favelas. Nevertheless, due to security risks and potential threats to life, it was decided not to proceed with this approach. This reflects the complex challenges and constraints faced in these areas.

Digital inclusion goes beyond simply implementing community networks. It also involves educating communities about the numerous opportunities that connectivity provides and how it can empower them to change their realities. This comprehensive approach aims to bridge the digital divide and ensure that everyone has access to the benefits brought by the internet.

Concerns about digital sovereignty have also been raised in the context of community networks. While community networks can foster independence and self-determination, some worry that emphasizing digital sovereignty may hinder cooperation and collaboration between different stakeholders. Striking a balance between digital sovereignty and collaboration is crucial for the success of community network initiatives.

Another important consideration is the lack of clarity regarding the definition and representation of the “community” in community networks. Understanding who constitutes the community and their role is essential for effective and inclusive decision-making and resource allocation. This issue highlights the need for greater transparency and inclusivity when implementing community network projects.

Moreover, there is concern about the reliance on mainstream platforms like Zoom and YouTube, which can contradict the ideals of digital sovereignty. While these platforms provide connectivity, their centralization compromises autonomy and control over digital infrastructure.

Community networks, while not a complete solution, can complement other initiatives and bring culture and communication to marginalized communities. They have the potential to act as intranets, providing connectivity and safeguarding those already connected.

Community networks can also be seen as an expression of digital sovereignty and self-determination. By allowing local communities to master their own digital destinies, community networks enable them to shape their digital experiences and use technology as per their preferences and needs.

The Internet Governance Forum (IGF) and the IOMEC coalition on community connectivity provide valuable platforms for discussing community connectivity issues and finding solutions. These initiatives facilitate collaboration and knowledge sharing among stakeholders interested in bridging the digital divide and promoting community networks.

In Nigeria, community networks have been successfully used for citizen science projects. Through community networks, internet connectivity was provided to monitor air pollution and oil spills. This example showcases the potential of community networks in addressing community issues and delivering value-added services.

In conclusion, connectivity remains a significant challenge in marginalized communities, especially in conflict-ridden areas. Community networks offer a potential solution to address this issue and provide alternatives to traditional telecom operators. However, building and sustaining community networks requires addressing security concerns, promoting digital inclusion, balancing digital sovereignty with cooperation, ensuring representation, and expanding partnerships and collaborations.

Carlos Baca

The analysis reveals several important points made by the speakers regarding the relationship between capacity building, sustainability, and community networks. Firstly, it is highlighted that national schools of community networks have been established in several countries to teach, implement, and support community networks. One of the key focuses of these schools is to educate communities about sustainability and e-waste management. Through these capacity-building processes, communities can develop a critical understanding of technology and strategies for sustainability. As a result of participating in these initiatives, sustainable strategies have been developed, such as the creation of bamboo towers in Indonesia and the use of AI for efficient fishing and farming practices. These examples demonstrate how capacity building can lead to innovative and sustainable solutions.

Secondly, the speakers emphasize the significance of peer-to-peer learning and technical know-how in contributing to environmental sustainability within community networks. The analysis highlights community networks in Kenya and South Africa that have effectively transmitted technical knowledge among community members. This knowledge exchange has resulted in improved equipment usage and reduced waste. By harnessing the power of peer-to-peer learning, the need for external technical assistance is reduced, leading to decreased travel and waste. This indicates that empowering communities with technical skills and knowledge can lead to more sustainable practices and self-sufficiency.

Furthermore, the analysis underlines the transformative power of travelling and visiting other territories in inspiring communities to reevaluate their own territories. Notably, participants in South Africa who had never left their communities began to rethink their own territories after observing different ways of living in other areas. This insight suggests that exposing communities to diverse perspectives and experiences through travel and learning can foster the development of sustainable cities and communities.

The analysis also highlights the importance of local content and production in the context of community networks. It is asserted that local content production is integral to the development and sustainability of community networks. By promoting local content and production, community networks can enhance local ownership, creativity, and cultural preservation. This observation underscores the significance of involving local communities as active participants in the design and operation of community networks to achieve sustainable outcomes.

In addition, the analysis addresses the concept of digital sovereignty and argues that it should not be viewed as a black and white concept. Rather, it should be understood as a process that involves understanding risks and making informed decisions. The speakers highlight the need for communities using platforms such as Zoom or Facebook to understand the implications of their use and make autonomous decisions. This argument suggests that digital sovereignty is contingent upon communities’ independent and informed choices regarding the use of digital tools and platforms.

Furthermore, the analysis delves into the complex and necessary element of negotiation with violent elements in rural areas. In particular, the involvement of Narcos in Mexico is acknowledged as they assist in developing infrastructure due to personal benefits. The speakers convey that while negotiating with violent elements is challenging, it is an essential aspect of working in rural areas, particularly when seeking to establish community connectivity in these regions.

Lastly, the analysis highlights the essential role of capacity building in achieving digital sovereignty. It is emphasized that autonomy in digital decision-making requires communities to have access to sufficient information and understanding of associated risks. With capacity building, communities can develop the skills and knowledge necessary to make informed decisions and navigate digital realms effectively. This observation underscores the importance of quality education and increasing access to digital infrastructure to empower communities in the pursuit of digital sovereignty.

In conclusion, the extended analysis sheds light on the interconnections between capacity building, sustainability, and community networks. It highlights the transformative impact of capacity-building processes on community networks, resulting in the development of sustainable strategies. Peer-to-peer learning and technical know-how within community networks are shown to contribute to environmental sustainability by reducing waste and promoting self-sufficiency. Additionally, the importance of travel and exposure to different perspectives in promoting sustainable cities and communities is highlighted. The significance of local content and production, autonomous decision-making in digital realms, negotiating with violent elements in rural areas, and the indispensable role of capacity building in achieving digital sovereignty are also explored. Overall, the analysis provides valuable insights into the critical elements required for the success and sustainability of community networks.

Senka Hadzic

During the session, the speakers focused on community networks and their role in digital sovereignty. The first speaker, an Internet measurement and data expert from the Internet Society, provided an overview of ISOC’s work on community networks and the significance of digital sovereignty.

ISOC’s work in community networks highlights the importance of empowering local communities to take control of their own digital infrastructure and services. By building and managing their own networks, communities can enhance their connectivity, bridging the digital divide and ensuring reliable and affordable internet access for all. This approach promotes digital inclusivity and helps overcome dependence on centralised telecommunications providers, fostering a sense of ownership and autonomy within the community.

Moreover, the first speaker emphasised the role of community networks in promoting digital sovereignty. Digital sovereignty refers to a nation’s ability to exercise control and maintain authority over its digital infrastructure, policies, and data. Community networks play a crucial role in achieving digital sovereignty by placing control of the network infrastructure in the hands of the community rather than relying on external companies or service providers. This shift gives communities the power to shape their own digital ecosystems, enabling them to protect their data, privacy, and interests.

The second speaker, Pedro Vilches from GrifiNet in Catalonia, focused on their flagship community network, which has been operational for almost 20 years and boasts over 37,000 active nodes. GrifiNet not only provides connectivity but also actively promotes circular economy principles and the reduction of e-waste.

GrifiNet’s emphasis on the circular economy involves encouraging the community to reuse and recycle electronic devices and reduce electronic waste. By doing so, GrifiNet aims to minimise the environmental impact associated with e-waste and create a more sustainable and environmentally friendly approach to technology.

Overall, the session highlighted the multiple benefits of community networks in achieving digital sovereignty. By empowering communities to build and manage their own networks, individuals gain access to reliable and affordable internet connectivity while also fostering a sense of ownership and control over their digital infrastructure. Additionally, the emphasis on circular economy principles by networks like GrifiNet showcases the potential for community networks to drive sustainability in the digital realm.

Nils Brock

In a recent publication titled “Can Environmental Practices Foster Community Network Sustainability?”, the challenges, benefits, and future prospects of community networks were discussed. The publication highlighted the difficulties that community networks face in managing the various technologies involved and ensuring the successful transmission of signals for local networks. These challenges emphasize the need for effective management and technical expertise within community networks.

However, the publication also noted that community networks can operate in a complementary or alternative manner to standard internet providers. This suggests that community networks have the potential to offer unique advantages and fill gaps in connectivity that traditional providers may not address. It is important, however, to consider the potential for external providers with different business models to undermine the efforts of community networks.

Another noteworthy point raised in the publication is the potential use of bamboo as a sustainable resource for building infrastructure in community networks. An example was given of a successful project in India, where bamboo was used for construction purposes. This highlights the potential for bamboo to provide both an eco-friendly and cost-effective solution for building and expanding community networks.

Moreover, the publication stressed the significance of solar energy as a critical resource for network functioning. This is because without energy, there can be no networking, including digital networking. The publication showcased an example from Brazil, where a community set up online courses to promote knowledge and understanding of photovoltaic systems. This initiative aimed to improve energy efficiency and promote the use of solar energy within community networks.

Furthermore, the publication emphasized the importance of providing local servers as a means to promote ownership of data and infrastructure in community networks. Local servers not only make services more sustainable to organize but also reduce environmental impact. It was also noted that capacity building efforts are necessary to support the implementation and management of local servers within community networks.

Lastly, the publication highlighted that the future of community networks extends beyond simply providing connectivity and access. The importance of local services, such as agriculture, education, and content creation, was stressed. These services can cater to the specific needs of different communities, both rural and urban, and contribute to their overall development and well-being.

In conclusion, the publication provided insights into the challenges faced by community networks but also highlighted their potential benefits and future prospects. By addressing the challenges of managing technologies, exploring alternative resources like bamboo, harnessing solar energy, promoting ownership of data and infrastructure, and focusing on local services, community networks can make significant contributions to sustainable and inclusive development.

Raquel Gatto

This comprehensive summary explores the state and challenges of community networks in Brazil, emphasising the importance of an evidence-based approach to understanding these networks. The analysis highlights that long-term sustainability is a significant concern, with half of the community networks failing to survive beyond the first year of operation. Additionally, the regulatory environment poses challenges for community networks.

To address these issues, a policy brief was created by APCZ (Association for Progressive Communications) and Anatel (Brazil’s National Telecommunications Agency). This brief not only identifies gaps in telecommunications for community networks but also resulted in the development of a technical toolkit for establishing these networks. Notably, the policy brief includes several recommendations for Anatel and the Ministry of Communication to tackle the challenges faced by community networks.

Recognising the importance of collaboration, a Community Networks Working Group has been formed in conjunction with Anatel. This working group comprises community network leaders and organisations dedicated to fostering the development of these networks. Its aim is to provide a common goal and vision, as well as maintain continuous interaction with government actors.

In terms of Brazil’s global agenda, as the host of the G20 in 2024, the country demonstrates a strong focus on the digital pillar, specifically emphasising the importance of achieving universal and meaningful connectivity. This indicates Brazil’s commitment to promoting digital inclusion and ensuring that all individuals have access to the benefits of the digital world.

The analysis also underscores that meaningful access extends beyond mere internet connectivity. It stresses the significance of considering the entire connected environment and the skills necessary to navigate it effectively. This insight highlights the importance of addressing the digital divide comprehensively, focusing not only on infrastructure but also on empowering individuals with the relevant digital skills.

Furthermore, the analysis emphasises the need to recognise and acknowledge the voices and concerns of local communities, both in rural and urban areas. It dispels the notion that only remote and rural areas face connectivity challenges and underscores the importance of listening to and considering the unique needs of different communities.

The analysis also identifies concerns regarding the trade-offs in collaborative arrangements and the awareness of what is relinquished in the process. This insight serves as a reminder that careful consideration should be given to the potential consequences and compromises involved in collaborative initiatives.

Regarding community networks, caution is advised in the consolidation of services and connectivity within these networks. The analysis suggests that community networks should not be conflated with traditional internet service providers. This cautionary note aims to ensure clarity and prevent misunderstandings regarding the role and scope of community networks.

In conclusion, the analysis underscores the need for an evidence-based approach to understand and address the challenges faced by community networks in Brazil. The efforts made by APCZ, Anatel, and the creation of the Community Networks Working Group signify positive steps towards overcoming these challenges. Brazil’s focus on universal and meaningful connectivity in its G20 agenda further underscores the country’s commitment to digital inclusion. However, it is crucial to consider the entire connected environment and the skills necessary for meaningful access. Local voices and concerns should be acknowledged, and careful consideration must be given to the trade-offs involved in collaborative arrangements. Moreover, community networks must be clearly distinguished from traditional internet service providers to avoid confusion.

Atsuko Okuda

Connecting the unconnected remains a pressing global issue, with approximately 2.6 billion people still lacking access to the internet. However, there have been notable advancements in internet connectivity. For instance, the Asia-Pacific region has made significant progress, with 4G mobile networks now covering more than 96% of the population. Furthermore, the introduction of approximately 265 commercial 5G networks worldwide signifies the ongoing efforts to improve connectivity and bridge the digital divide.

Addressing this challenge requires a holistic approach involving multiple stakeholders. By adopting a whole-of-society approach, meaningful partnerships can be forged, and silos can be overcome. This approach has shown promise, as evidenced by the successful implementation of the International Telecommunication Union’s (ITU) Smart Villages initiative. The initiative serves as a prime example of how a whole-of-government and whole-of-society approach can contribute to enhancing connectivity.

Moreover, community networks, such as telecenters, play a crucial role in achieving both digital and environmental sustainability. A recent joint study by the ITU and the Internet Society (ISOC) highlighted the significance of telecenters and community networks in promoting sustainability. The study identified six dimensions of sustainability, including environmental sustainability, emphasizing the critical role that community networks play in expanding access to information and communication technology and contributing to broader sustainable development goals.

In conclusion, while connecting the unconnected remains a global challenge, progress is being made in improving internet connectivity. The widespread deployment of 4G and the launch of 5G networks demonstrate significant advancements in this regard. Additionally, a whole-of-society approach has proven effective, as seen in the successful implementation of ITU’s Smart Villages initiative. Furthermore, community networks, such as telecenters, are instrumental in achieving both digital and environmental sustainability. These insights highlight the importance of continued collaboration and innovative approaches to address the global challenge of connecting the unconnected.

Amreesh Phokeer

The Internet Society is actively involved in expanding community networks worldwide, with a particular focus on areas in Africa, Asia, and the Himalayas in Nepal. Their initiatives aim to support and enhance over 100 complementary connectivity solutions, while also providing training to over 10,000 individuals to maintain their own internet infrastructure. This commitment to expanding community networks reflects the Internet Society’s dedication to bridging the digital divide and promoting equal access to the internet for all.

A crucial aspect considered by the Internet Society is digital sovereignty. They recognise the importance of ensuring that countries have control over their own digital infrastructure and are not overly dependent on external entities. By supporting community networks, the Internet Society helps empower communities to establish their own internet connectivity, creating a sense of ownership and independence.

Furthermore, the Internet Society also places emphasis on environmental sustainability. In several African countries, issues concerning electricity access and affordability persist. To address these challenges, the Internet Society actively works towards reducing the costs of accessing equipment required for off-grid community networks. This approach promotes the use of renewable energy sources in these networks, aligning with the Sustainable Development Goals of affordable and clean energy and climate action.

In addition to addressing digital sovereignty and environmental sustainability, the Internet Society also advocates for the importance of maintaining local content and connectivity. They promote connectivity to local infrastructure, such as Internet exchange points, which facilitates the exchange of data within local communities. Additionally, community networks have started hosting their own services, such as local caches or video conferencing, particularly during the ongoing pandemic. These efforts not only enhance connectivity, but also contribute to responsible consumption and production, aligning with the Sustainable Development Goals of sustainable cities and communities.

Overall, the Internet Society’s involvement in expanding community networks demonstrates their dedication to promoting access to the internet and bridging the digital divide. By empowering communities, supporting digital sovereignty, striving for environmental sustainability, and maintaining local content and connectivity, the Internet Society plays a significant role in creating a more inclusive and connected digital world.

Pedro Vilchez

In the first argument, the speaker proposes a solution to reduce e-waste by making users responsible for the way Wi-Fi routers are used and allowing these devices to enter the circular economy. The argument is made in light of the fact that Wi-Fi routers are typically designed for a limited purpose and timeframe, leading to a significant amount of e-waste. The suggestion is to allow Wi-Fi routers to be modified and reused, similar to computers, which would prolong their lifespan and reduce the overall waste generated.

Moving on to the second argument, the speaker highlights the importance of community networks in Europe for maintaining telecommunications infrastructure and meeting societal needs. It is noted that both the public and private sectors are facing challenges in maintaining the telecommunications infrastructure efficiently. The speaker emphasizes that community networks can serve as a common resource model, enabling participation from both sectors. This approach can alleviate the burden on individual entities while ensuring the smooth operation of the infrastructure.

Furthermore, the speaker highlights that community networks go beyond just delivering internet access; they also foster mutual aid and knowledge sharing within communities. This aspect further strengthens the case for community networks as they not only provide essential services but also promote collaboration and community development.

To support the effectiveness of community networks, the example of GrifiNet is presented. It is mentioned that GrifiNet, an ISP spin-off, managed to earn 30 million Euros in 2022. This success serves as evidence of the efficacy of community networks and their potential to thrive in the telecommunications industry.

In conclusion, the first argument focuses on reducing e-waste by making users responsible for the proper use of Wi-Fi routers and integrating them into the circular economy. The second argument highlights the significance of community networks in Europe for maintaining telecommunications infrastructure and meeting societal needs. The evidence presented demonstrates the positive outcomes and potential benefits of embracing community networks. Overall, both arguments provide valuable insights into sustainable practices and innovative approaches in the technology and telecommunications sectors.

Luca Belli

Community networks play a crucial role in building digital sovereignty and environmental sustainability. These networks are driven by communities themselves and provide a model of digital sovereignty that is not defined by states, but driven by the communities themselves. They enable self-determination and self-governance, allowing communities to understand and regulate technology effectively. Notably, community networks have successfully been doing this for the past 20 years.

Moreover, community networks manage their connectivity infrastructure as a commons, which supports environmental sustainability. They understand and mitigate the potential negative environmental impacts of technology, ensuring that their actions align with environmental goals. This demonstrates their commitment to building sustainable communities.

Additionally, a multi-stakeholder model is suggested as an effective approach for building and implementing connectivity networks. This approach involves different stakeholders coming together to not only discuss but also actively create and execute plans. By involving various stakeholders, including community members, organisations, and government bodies, this model ensures a diverse range of perspectives and expertise. This can lead to more comprehensive and inclusive connectivity networks.

Community networks also create an entire ecosystem of content and services that are developed by and for the community. This empowers local communities and fosters a sense of ownership and pride. It allows communities to determine their own digital destiny and use technology for their specific needs, contributing to digital sovereignty.

While community networks are not a solution to all the world’s problems, they do bring significant benefits to underserved areas. They can provide access to culture, communication, and education, bridging the digital divide and empowering those who were previously left behind.

It is worth noting that successful community networks can perform like large telecommunication companies but with lower costs and community governance. Some community networks have been successful in creating self-sufficient intranets, allowing information and services to be shared within the community. This demonstrates the potential of community networks to rival traditional internet service providers and bring connectivity to underserved areas in a sustainable and cost-effective manner.

In conclusion, community networks are a powerful tool in building digital sovereignty and environmental sustainability. They empower communities, enabling self-determination and fostering a sense of ownership and responsibility. By adopting a multi-stakeholder model, community networks can create comprehensive and inclusive connectivity networks. They bring culture, communication, and education to underserved areas, bridging the digital divide. Although community networks have their limitations, their positive impact on communities and their ability to change lives is undeniable.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

DC-IoT Progressing Global Good Practice for the Internet of Things | IGF 2023

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Wout de Natris

Summary:
The analysis of IoT security policies across different countries revealed some significant findings. Firstly, there is a noticeable gap in the policy framework for IoT security, particularly in many countries of the Global South. This suggests that these countries lack comprehensive guidelines and regulations to address IoT device security challenges. Additionally, national policy practices for IoT security often differ significantly from those of other countries, indicating a lack of alignment and standardization. The study highlights the importance of implementing accountability frameworks throughout the IoT device lifecycle. The complexity of IoT security requires a comprehensive approach that considers factors such as data privacy, cybersecurity, and standards. Governments are urged to prioritize security by design during hardware and software procurement to enhance security standards. Lack of user awareness about data privacy implications necessitates improved education and awareness campaigns. Data security standards are recommended to protect against abuse and misuse of data. The analysis raises concerns about future implications of data insecurity, emphasizing the need for proactive actions to address IoT security challenges. These findings provide insights for policymakers and stakeholders in developing robust IoT security strategies and frameworks.

Mark Carvell

The discussion centred around key topics related to the Internet of Things (IoT) and its impact on society. One important point raised was the necessity for a universal labelling scheme for IoT devices to ensure harmonisation and clarity for consumers. The argument posited was the need for a standardised labelling system that enables easy identification and comprehension of IoT products, especially as individuals increasingly travel with their devices. The sentiment surrounding this topic was neutral, reflecting concerns without strong opinions expressed.

Another topic of discussion was the role of public administrations in IoT applications, particularly in addressing government concerns about security. The question was raised regarding how IoT applications can meet government security requirements, given the interactions between governments and citizens. This inquiry underscored the significance of striking a balance between innovation and security in IoT technologies. The sentiment surrounding this topic was also neutral, highlighting the need for further exploration and understanding.

Ethical considerations in the development of IoT systems and networks were also emphasised during the discussion. The unpredictability factor associated with IoT development was addressed, and developers were encouraged to ensure that their systems and networks are developed ethically. This topic generated a positive sentiment, indicating a belief in the paramount importance of ethical innovation in the IoT industry. The sentiment reflected a acknowledgment of the potential ethical challenges posed by the rapid advancement of IoT technologies.

Lastly, there was an encouragement for the dynamic coalition to utilise the EUDIG platform for advocacy purposes. The EUDIG platform was described as having a call for issues, and a forum was scheduled to take place in Vilnius in June. The sentiment surrounding this topic was positive, indicating a belief in the effectiveness and value of using the EUDIG platform for advocacy.

In conclusion, the discussion covered a range of important topics related to the IoT and its societal impact. These topics included the need for a universal labelling scheme, the role of public administrations in ensuring security, ethical innovation in IoT development, and the value of using the EUDIG platform for advocacy. It is evident that there are various considerations and challenges associated with implementing and developing IoT technologies, and further exploration and collaboration are necessary to effectively address these issues.

Barry Lieber

Security for the Internet of Things (IoT) is a multifaceted and intricate issue, encompassing factors such as authentication, confidentiality, and data integrity. Barry, an expert with almost 25 years of experience in the field, emphasizes the importance of prioritising IoT security. To fully comprehend and address this issue, it is necessary to break it down into various components.

The integration of different sources is paramount in realising the full potential of the IoT. The seamless communication and collaboration among diverse devices, such as cars, houses, and calendars, serve as prominent examples of how integration enhances the IoT experience. However, the complexity of maintaining this integration while ensuring security and privacy presents a significant challenge.

Authentication is one aspect of IoT security that requires careful consideration. With numerous devices exchanging information and interacting within the IoT, it is crucial to establish secure methods of verifying their identities. This helps prevent unauthorised access and malicious activities, safeguarding the overall IoT ecosystem.

Confidentiality is another significant factor in IoT security. As vast amounts of sensitive data are transmitted and processed within the IoT, protecting this information from unauthorised disclosure is imperative. Implementing robust encryption protocols and secure data storage mechanisms becomes crucial to maintaining confidentiality and safeguarding user privacy.

Data integrity plays a pivotal role in IoT security as well. With the vast quantity of data being communicated and processed within the IoT network, it is essential to ensure its accuracy, consistency, and reliability. Implementing mechanisms for data validation, verification, and error detection is vital to maintain the integrity of the information exchanged within the IoT environment.

The analysis of the various supporting facts and arguments highlights that security is not merely a buzzword in the IoT landscape. The inherent complexities involved in integrating diverse systems while maintaining security and privacy underscore the challenges faced in fully harnessing the potential of the IoT. The insights gained from this analysis underscore the need for ongoing research, development, and implementation of robust security measures to address the complexities and mitigate the risks associated with IoT security.

In conclusion, security for the Internet of Things is a multifaceted and complex issue that necessitates attention to various factors such as authentication, confidentiality, and data integrity. The integration of different sources is crucial in unlocking the true potential of the IoT, but it also poses challenges in maintaining security and privacy. With the rapid expansion of the IoT landscape, it is imperative to invest in developing and implementing robust security measures to safeguard the IoT ecosystem and protect user information.

Elaine Liu

The speakers in the discussion agree that IoT (Internet of Things) should have different policies and guardrails depending on the use cases involved. They argue that considering the diverse range of data collection in IoT, which can vary from consumer to organizational to agency levels, it is vital to establish suitable policies that address the specific needs and risks associated with each use case. This approach recognizes the importance of tailoring regulations to the unique characteristics and requirements of different IoT applications.

Furthermore, the speakers emphasize the significance of taking into account the entire value chain when setting guiding principles for IoT. They highlight that hardware, software, operating systems, and data analytics all play crucial roles in the IoT process. By considering the entire value chain, policymakers can develop comprehensive and effective guidelines that address various aspects of IoT implementation, ensuring its smooth and secure operation.

These discussions align with SDG 9: Industry, Innovation, and Infrastructure, which emphasises the need to foster sustainable industrialisation, promote research and development, and enhance access to information and communication technologies. IoT is a key aspect of Industry 4.0 and digital transformation, and thus, setting appropriate policies and guidelines for IoT corresponds to addressing the goals and targets outlined in SDG 9.

The speakers’ arguments are supported by the evidence provided throughout the discussion. They acknowledge the complexity and diversity of IoT applications and the need for tailored policies to manage the risks associated with each use case. Additionally, they emphasise the interconnected nature of the IoT value chain, where hardware, software, operating systems, and data analytics all contribute to the overall functionality and performance of IoT systems. Therefore, their arguments are well-grounded and offer valuable insights for policymakers and stakeholders involved in IoT governance.

In conclusion, the speakers advocate for the development of different policies and guidelines for IoT based on its specific use cases. They also stress the importance of considering the entire value chain, encompassing hardware, software, operating systems, and data analytics, when setting guiding principles for IoT. These discussions align with the objectives of SDG 9 and provide valuable insights into the complexities and requirements of IoT governance.

Alejandro Pisanty

The analysis reveals several key points related to the consumer Internet of Things (IoT) and its impact on security, industry, and infrastructure.

Firstly, consumer IoT devices are causing significant concern regarding security. It is essential to identify the entities that are leveraging IoT to exert power. These entities may include individuals, organisations, or even governments. Identifying these entities is crucial to establish accountability and take necessary security measures to protect against potential breaches or attacks.

Secondly, the development of consumer IoT is primarily driven by small companies. These companies often produce and sell IoT devices at very low prices, making them accessible to a wide range of consumers. However, this also creates challenges in terms of security awareness and compliance. Consumers may not be fully aware of the need to secure their devices or the potential risks associated with them. Additionally, the affordability of these devices means that they may not undergo rigorous security testing or meet established standards.

Furthermore, the deployment of consumer IoT devices poses challenges to openness, interoperability, and core internet values. Different technologies and standards are used for communication between these devices, making it difficult to establish the necessary interoperability and ensure seamless connectivity. This can lead to fragmented systems and hinder the growth and development of IoT applications. Additionally, the increased deployment of these devices expands the attack surface for everyone. With numerous connected devices, the potential for vulnerabilities and cyber-attacks increases, posing a threat to individual privacy, data security, and overall network integrity.

Moreover, the sale of many IoT devices occurs outside the oversight of national standardisation bodies. This means that these devices may not adhere to specific standards or regulations, raising concerns about their compliance and quality. The lack of standardisation can lead to compatibility issues and hinder collaboration and innovation in the broader IoT ecosystem.

In conclusion, the analysis highlights the urgent need for enhanced security measures, awareness, and standardisation efforts in the consumer IoT sector. It is vital to address the security concerns surrounding these devices, identify the entities responsible for IoT deployments, and ensure that consumers are informed about the importance of securing their devices. Additionally, industry stakeholders should collaborate to establish common technological standards and guidelines to promote openness, interoperability, and cybersecurity in the consumer IoT realm. By doing so, the potential of IoT can be fully realised while simultaneously safeguarding privacy and ensuring the integrity of connected systems.

Sandoche Balakrichenan

The presentations on IoT emphasized the significance of interoperability, scalability, and zero trust. It was argued that these features are essential for the success of IoT. The domain name system (DNS) was proposed as a potential solution for IoT-based identity and access management in a zero-trust environment. DNS is widely used for communication by internet users and can potentially be used for IoT as well, enabling secure and controlled access to IoT devices and systems.

LoRaWAN, regarded as one of the most constrained networks in IoT, was highlighted as an ideal testing ground for the concept of interoperability, scalability, and zero trust. The successful implementation of this concept with LoRaWAN could potentially be applied to other IoT networks and devices.

AFNIC, a prominent organisation, is developing a dynamic identity management system based on DNS. The aim of this system is to enable interoperability among various types of identifiers such as RFID and barcodes, facilitating efficient and effective management of identities within the IoT ecosystem.

The use of DNS and DANE (DNS-based Authentication of Named Entities) was discussed as a way to eliminate the need for a certificate authority ecosystem. This approach, combined with the successful tests of TLS 1.3 and ongoing efforts to add privacy features, highlights the potential of DNS and DANE to achieve dynamic, scalable, and zero trust capability in IoT.

The presentations also touched upon the collaboration between the supply chain industry and IoT, particularly in relation to GS1 devices such as barcodes and RFID. This collaboration highlights the integration of technology systems with the supply chain industry, fostering innovation and enhancing efficiency.

Furthermore, the speaker mentioned the use of LoRaWAN with MAC IDs, showcasing an alternative approach to identification beyond traditional names and IP addresses. This demonstrates that concerns in IoT extend beyond conventional methods and require exploration of new and diverse approaches.

In conclusion, the presentations underscored the importance of interoperability, scalability, and zero trust in IoT. The potential application of DNS for IoT-based identity and access management, the development of a dynamic identity management system by AFNIC, and the use of DNS and DANE to eliminate the need for a certificate authority ecosystem were notable insights. The collaboration between the supply chain industry and IoT, as well as the exploration of alternative identification methods such as LoRaWAN with MAC IDs, further exemplify the dynamic nature of IoT and the need for innovative solutions.

Dan Caprio

In a recent discussion on the Internet of Things (IoT), it was highlighted that there is a significant power asymmetry between consumers and their understanding of IoT. This issue has been observed not only in the United States but also in other parts of the world.

To address this, the US government has launched an ongoing effort aimed at bringing consumer labelling to the IoT. This initiative is being carried out through a public-private partnership, with the Federal Communications Commission (FCC) being responsible in the US. The aim is to ensure responsible consumption and production in the IoT sector, in line with SDG 12: Responsible Consumption and Production.

This labelling scheme would involve putting labels on IoT device packaging, providing consumers with information about the level of security offered. This proposed labelling system is seen as a means to empower consumers by giving them the necessary information to make informed choices and protect themselves in the rapidly growing IoT landscape.

Furthermore, having consumer labels on IoT devices could also facilitate international harmonisation. The idea is that these labels could pave the way for global standards and interoperability in the IoT industry. This notion aligns with Vint Cerf’s view on the importance of standards and interoperability in the IoT ecosystem.

However, it is important to note that the US consumer label for IoT is still in its early stages. The FCC announced this initiative in August, but it will not take effect until at least the end of next year. Therefore, additional work is required to develop and implement a comprehensive labelling system that effectively serves the needs of consumers.

During the discussion, it was suggested that the Internet Governance Forum (IGF) should play an active role in addressing this issue. It was acknowledged that raising awareness and fostering dialogue around consumer labelling in the IoT is a crucial step towards ensuring responsible and secure IoT adoption. It was proposed that the IGF, along with regional IGFs, should include this topic in their agendas and actively engage stakeholders in finding effective solutions.

Overall, the discussion emphasized the need for consumer empowerment and protection in the IoT sector. The ongoing efforts in the US to introduce consumer labelling and the potential for international harmonisation through such initiatives are promising steps in the right direction. However, more work needs to be done to ensure that a comprehensive and effective labelling system is developed and implemented. The active involvement of the IGF and its regional counterparts can significantly contribute to addressing this issue and promoting responsible IoT practices.

Vint Cerf

The speakers in the analysis delve into various crucial aspects of the Internet of Things (IoT). They highlight the importance of standards and interoperability in order to ensure that devices from multiple manufacturers can effectively work together. This is crucial for the IoT to reach its full potential as it allows for seamless communication and integration between devices. It also enables consumers to configure their IoT devices in a way that is useful and tailored to their specific needs. The argument put forth is that without standards and interoperability, the IoT ecosystem would be fragmented and hindered by compatibility issues.

Another key point discussed is the need for secure and upgradeable operating systems for IoT devices. The speakers emphasise that every IoT device will require an operating system, and with that comes the need for regular updates and bug fixes. The argument is made that these updates are necessary to address vulnerabilities and ensure the overall security of the devices. Without secure and upgradeable operating systems, IoT devices are at risk of exploitation by malicious actors.

The speakers also stress the significance of strong authentication, cryptography, and digital signatures in the context of IoT devices. They argue that these measures are crucial for ensuring trusted communication between devices. The speakers assert that IoT devices need to have a strongly authenticated identity and must also be aware of what other devices they are allowed to communicate with. By implementing cryptography and digital signatures, IoT devices can authenticate and verify the integrity of the data being exchanged, reducing the risk of unauthorized access or tampering.

Additionally, the scalability of configuration management and control for IoT devices is highlighted. The speakers note that in residential settings, the number of devices could easily reach the hundreds, while in industrial settings, it could be in the thousands. They argue that effective configuration management and control systems need to be in place to handle the sheer volume of devices and ensure efficient and reliable operation.

However, one speaker expresses a negative sentiment towards voice recognition as a control method for IoT devices. They highlight concerns regarding the reliability of voice recognition technology, as it is not 100% accurate and can lead to frustration for users. Moreover, there is the possibility of misuse, where unauthorized individuals could gain access to IoT devices by mimicking the owner’s voice. This raises security concerns and questions the reliability of voice recognition as a viable control method for the IoT.

In a somewhat unrelated observation, the analysis briefly mentions Vint Cerf’s extensive wine collection in his house, with approximately 3,000 bottles. It is suggested that the next owner of his house will have the responsibility of managing this impressive collection.

In conclusion, the speakers emphasize the importance of standards, interoperability, secure operating systems, strong authentication, cryptography, and digital signatures in the world of IoT. These elements are seen as crucial for the successful deployment and operation of IoT devices. Additionally, the scalability of configuration management and control systems is acknowledged as a critical factor in managing a large number of IoT devices. It is important to carefully consider the control methods used for IoT devices, as voice recognition may not be the most reliable option due to its limitations and potential for misuse.

Hiroshi Esaki

According to experts, the correct functioning of artificial intelligence (AI) relies heavily on trustworthy data. AI does not have its own algorithm; instead, it requires reliable data to provide accurate and insightful results. This emphasizes the importance of data quality and integrity in AI systems.

In the business field, IoT devices are increasingly prevalent across various industries, including agriculture. These devices offer numerous benefits, such as improved efficiency, increased productivity, and enhanced decision-making. However, to fully leverage the potential of IoT, there is a need for good ownership, responsibility, and authentication. This ensures that the devices are used ethically and securely, protecting sensitive data and mitigating potential risks.

The evolution of IoT into the Internet of Functions (IOF) brings a paradigm shift from traditional cloud computing systems. With IOF, functions can be transferred and executed anywhere over the internet. This opens up new possibilities for decentralized and distributed systems, enabling greater flexibility and scalability in IoT networks.

One critical aspect of the IoT ecosystem is the security of devices. To ensure secure and safe IoT deployment, scalable systems for labeling or certification are needed. This helps in identifying and verifying the authenticity and integrity of IoT devices, making it easier for users to trust and rely on them.

A noteworthy observation is the increasing importance of zero-trust capability in IoT devices. This means that every single device must have built-in security measures that continuously verify and authenticate network connections. By adopting a zero-trust approach, the IoT ecosystem can provide a higher level of security, protecting sensitive data and preventing unauthorized access.

Furthermore, IoT devices and the data they produce can make a significant contribution to carbon neutrality and decarbonization efforts. These devices, along with the concept of digital twins, enable better monitoring and management of resources, leading to more sustainable practices and reduced environmental impact.

Additionally, internet security is a crucial element that should be considered in the IoT ecosystem. It should be end-to-end, starting with individual users taking responsibility for protecting their network. Traceability and interoperability play a vital role in ensuring secure internet operation, and efforts are being made worldwide, including in Japan, to provide users with traceability features.

In conclusion, the future use of IoT devices is expected to evolve beyond their original purposes. These devices have the potential to transform industries, improve efficiency, and enable innovative applications. However, realizing the full potential of IoT requires addressing critical areas such as data quality, device security, and internet security. By doing so, we can create a more reliable, secure, and sustainable IoT ecosystem.

Jonathan Cave

The Internet of Things (IoT) is described as a complex adaptive system that produces things that are yet to be imagined. This system consists of connected devices that work together to create complex functions, even though these functions may not have well-defined or objectively defined definitions. The IoT has the potential to revolutionize various industries and aspects of our lives through its interconnectedness.

However, privacy concerns arise when it comes to the IoT. These devices have the ability to collect vast amounts of personal and private information from their users, regardless of whether it is relevant to their nominal functioning or design. The collection of such data raises questions about the privacy of data, devices, and their functions within the IoT context.

Another aspect to consider is the impact of IoT devices on human behavior. For instance, when people use smart speakers, they begin to trust them to deliver content, thereby giving these devices a power they did not originally have. This trust implies that IoT devices are not just sensors but also actuators, with the ability to reprogram their users’ behavior, understanding, and attention.

The interaction between individuals and IoT devices also calls for a reshaping of ethical frameworks. As the operation of these devices and systems changes people’s behavior, understanding, and attention, there is a need to align our ethical frameworks with the evolving nature of individual and collective psychology in relation to IoT devices.

Additionally, the concept of data ownership is being reconsidered in the context of the IoT. It becomes necessary to resurrect the notion of data ownership so that people can be held responsible for their actions and the functioning of these systems. This is crucial in maintaining accountability and ensuring that individuals take ownership of their data and its usage within the IoT ecosystem.

Furthermore, ethical reflection, consideration, and control are fundamental when it comes to IoT devices. The ethical implications of these devices should be thoroughly assessed and addressed, with due consideration given to the potential consequences on individuals and society as a whole. This involves scrutinizing IoT projects for their ethical considerations and the application of legal mechanisms to make control measures more predictable.

Overall, keeping the conversation open on ethical considerations and control issues is of utmost importance. The emergence of new problems within the IoT ecosystem requires a collaborative approach, as no single party can perceive and address all the challenges alone. Simply ticking the ethical box at the beginning of a project and leaving it to lawyers is not enough. Ongoing ethical reflection and open discussions are essential to ensure that the ethical implications of IoT devices are adequately addressed and controlled.

Sarah T. Kiden

In the realm of the Internet of Things (IoT), power imbalances exist, calling for accountability and responsibility measures. These imbalances may arise during the design or research phase. Concerns are raised about the lack of consumer influence on future IoT deployments, leading to a need for empowering consumers.

To address these issues, collecting user stories on the harms caused by IoT devices can guide the creation of design guidelines and influence policy changes. Organizations like the Algorithmic Justice League, Data & Society, and Amnesty International have begun documenting AI harms, providing evidence to sway policymakers in the right direction.

Overall, the analysis highlights the presence of power asymmetries in the IoT ecosystem and underscores the importance of accountability and responsibility measures. Empowering consumers and involving them in shaping the future of IoT deployments is crucial. Furthermore, gathering user stories and documenting the harms caused by IoT devices can serve as valuable evidence for influencing policy changes and creating design guidelines. This comprehensive summary emphasizes the significance of addressing power imbalances and promoting responsible practices in the IoT industry.

Avri Doria

During the session, it was mentioned that no questions had been received online thus far. However, the speaker kindly invited participants to submit any questions through the chat or QA function. The audience was asked to keep their questions brief since only 15 minutes remained in the session due to the amount of content covered in the first part.

This demonstrates the speaker’s willingness to engage with attendees and provide valuable insights. Despite the lack of questions at that point in the session, it emphasized the importance of participant engagement to enhance the overall learning experience.

In conclusion, the speaker encouraged participation by inviting individuals to submit their questions through the chat or QA function. This call for engagement highlighted the significance of participant interaction in shaping the session and allowing for a more enriching learning experience.

Maarten Botterman

The Internet of Things (IoT) is a global technology that offers new opportunities to address challenges and is adapted and developed globally. It has the potential to revolutionize society by improving efficiency, decision-making, and connectivity through device communication and data exchange. The IoT is seen as a necessary technology with positive sentiment.

The argument for the IoT is that it can ethically address societal challenges by deploying systems in disaster-stricken regions and rural areas. It requires the involvement of all stakeholders and acknowledges the varying challenges across different regions. Sustainability and inclusivity are emphasized, with a focus on creating accountable ecosystems.

However, the adoption of the IoT also presents challenges such as new risks and the potential weaponization of technology. Legal clarity and regulation are necessary for IoT investment and development, and procurement practices can improve security. It is important to take proactive measures and implement self-certification and DNS for enhanced security.

Different networks and the use of DNS for interoperability and scalability are considered. AI also comes with risks, but the potential benefits justify them. Informed consent, labeling, and change management are emphasized to inform people about risks and adapt to the fast pace of change in the IoT space.

In conclusion, the IoT has the potential to address challenges ethically and create sustainable ecosystems. Legal clarity, regulation, and proactive measures are needed to address risks. Different networks and DNS can improve interoperability and scalability. Informed consent, labeling, and change management are important considerations for successful implementation.

Speakers

&

’Alejandro

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Avri

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Barry

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Dan

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Elaine

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Hiroshi

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Jonathan

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Maarten

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Mark

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Sandoche

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Sarah

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Vint

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Wout

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Data Protection for Next Generation: Putting Children First | IGF 2023 WS #62

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Audience

The discussion focuses on the necessity of age verification and data minimization in relation to children’s rights in the digital environment. It is argued that companies should not collect additional data solely for age verification purposes, and trust in companies to delete data after verification is considered crucial to protect children’s privacy.

Another important point raised in the discussion is the need for the early incorporation of children’s rights into legislation. The inclusion of children in decision-making processes and the consideration of their rights from the beginning stages of legislation are emphasized. This is contrasted with the last-minute incorporation of children’s rights seen in the GDPR.

The discussion also advocates for the active participation of children in shaping policies that affect their digital lives. Examples of child-led initiatives, such as Project Omna, are mentioned to illustrate the importance of including children’s perspectives in data governance. The argument is made that involving children in policy-making processes allows for better addressing their unique insights and needs.

The role of tech companies is also explored, with an argument that they should take child rights into consideration during their product design process. Collaborating with tech companies to develop age verification tools is suggested as a means of ensuring the protection of children’s rights.

Additionally, it is noted that children, often referred to as “Internet natives,” may have a better understanding of privacy protection due to growing up in the digital age. This challenges the assumption that children are unaware or unconcerned about their digital privacy.

The discussion concludes by highlighting the advocacy for education and the inclusion of children in legislative processes. Theodora Skeadas’s experience in advocacy is mentioned as an example. The aim is to educate lawmakers and involve children in decision-making processes to create legislation that better safeguards children’s rights in the digital environment.

Overall, this discussion underscores the importance of age verification, data minimization, the incorporation of children’s rights in legislation, the active participation of children in policy-making processes, and the consideration of child rights in tech product design. These measures are seen as vital for protecting and promoting children’s rights in the digital age.

Edmon Chung

The discussion revolves around various important topics related to internet development, youth engagement, and online safety. Dot Asia, which operates the .Asia top-level domain, plays a crucial role in these areas. In addition to managing this domain, Dot Asia uses the earnings generated from it to support internet development in Asia. Moreover, Dot Asia runs the NetMission program, which aims to engage young people in internet governance. These initiatives are viewed positively as they promote internet development and youth engagement in Asia.

Another significant development is the launch of the .Kids top-level domain in 2022. This domain is specifically designed to involve and protect children, based on the principles outlined in the Convention on the Rights of the Child. By prioritizing children’s rights and safety, the .Kids initiative aligns with the principles of the convention. This positive step highlights the importance of involving children in policy-making processes that affect them.

Cooperation among stakeholders is emphasized for ensuring online safety. Various forms of online abuses and domain name system (DNS) abuses exist, requiring collaborative measures to create a safer online environment. The .Kids top-level domain is seen as a valuable platform to support online safety initiatives. By creating a dedicated space for children, it can contribute to the development and implementation of effective online safety measures.

The discussion also focuses on privacy, particularly in relation to data collection and age verification. Privacy is not just about keeping data secure and confidential but also about questioning the need for collecting and storing data in the first place. The argument is made that data should be discarded after the age verification process to strike a balance between protecting children and safeguarding their privacy.

The use of pseudonymous credentials and pseudonymized data are suggested as appropriate approaches for age verification. These methods allow platforms to verify age without accessing or storing specific personal information, addressing privacy concerns while still ensuring compliance with age restrictions.

Additionally, it is highlighted that trusted anchors should delete raw data after verification, and regulation and audits are necessary for companies that hold data. The importance of building the capacity for child participation in internet governance is also emphasized. These factors contribute to creating a safer, more inclusive, and child-centric online environment.

In summary, the discussion focuses on various important aspects of internet development, youth engagement, and online safety. Dot Asia’s initiatives and the introduction of the .Kids top-level domain reflect positive steps toward promoting internet development and protecting children’s rights. The importance of stakeholder cooperation, privacy considerations, and child involvement in policy-making processes are also highlighted. By addressing these aspects, stakeholders can work together to create a safer and more inclusive online space for all.

Sonia Livingstone

The discussions revolved around the significance of safeguarding children’s right to privacy in the digital realm and its interlinkage with other child rights. It was emphasised that children’s privacy is essential as it directly influences their safety, dignity, and access to information. Sonia Livingstone, an expert in the field, played an instrumental role in the drafting group for general comment number 25, which specifies how the Convention on the Rights of the Child applies to digital matters.

Furthermore, it was noted that children themselves possess an understanding of and are actively involved in negotiating their digital identity and privacy. To understand their perspective, a workshop was conducted by Livingstone to gauge how children perceive their privacy and the conditions under which they would be willing to share information globally. It was found that children universally recognise the importance of privacy and view it as a matter that directly affects them.

The introduction of age-appropriate design codes, tailored to cater to a child’s age, was highlighted as an effective regulatory strategy to protect children’s privacy. These codes have been implemented in various international and national settings, ensuring privacy in accordance with the child’s developmental stage. Livingstone, alongside the Five Rights Foundation, spearheaded the Digital Futures Commission, which sought children’s views to propose a Child Rights by Design approach.

Addressing the identification of internet users who are children for the purpose of upholding their rights online was identified as another crucial aspect. Historically, attempts to respect children’s rights on the internet have failed because the age of the user was unknown. It was emphasised that a mechanism is needed to determine the age of each user in order to effectively establish who is a child.

Regarding the implementation of age verification, it was suggested that a new approach is needed, involving third-party intermediaries for age checks. These intermediaries should operate with transparency and accountability, ensuring accuracy and privacy. However, it was acknowledged that not all sites and content necessitate age checks, and a risk assessment should be conducted to determine the appropriateness of such checks. Only sites with age-inappropriate content for children should require age verification.

The role of big tech companies in relation to age assessment was also discussed. It was posited that these companies likely already possess the capability to accurately determine the age of their users, highlighting the potential for collaboration in ensuring child rights protection online.

Furthermore, the importance of companies adopting child rights impact assessments was stressed. Many companies already understand the importance of impact assessments in various contexts, and embedding youth participation in the assessment process is seen as crucial. Consideration should be given to the full range of children’s rights.

There were differing perspectives on child rights impact assessments, with some suggesting that they should be made mandatory for companies. It was argued that such assessments can bring about significant improvements in child rights protection when integrated into company processes.

The active involvement of children and young people in the development of data protection policies was also highlighted as a key recommendation. Their articulate and valid perspectives should be taken into account to ensure effective policy formulation.

Finally, the importance of adults advocating for the active participation of young people in meetings, events, and decision-making processes was emphasised. Adults should actively address the lack of youth representation and ensure that young people have a voice and influence in relevant discussions.

In conclusion, the discussions centred on the necessity of protecting children’s privacy in the digital environment and its alignment with other child rights. Various strategies, including age-appropriate design codes and third-party intermediaries for age verification, were proposed. The involvement of children, youth, and adults in policy development and decision-making processes was considered pivotal for effective protection of children’s rights online.

Emma Day

Civil society organizations play a crucial role in advocating for child-centred data protection. They can engage in advocacy related to law and policy, as well as litigation and regulatory requests. For example, Professor Sonia Livingstone’s work on the use of educational technology in schools and the launch of the UK’s Digital Futures Commission highlight the importance of civil society organizations advocating for proper governance of educational technology in relation to children’s data protection.

Litigation and making requests to regulators are another important avenue for civil society organizations to advance child-centred data protection. This is evident in cases such as Fair Play’s complaint about YouTube’s violation of the Children’s Online Privacy Protection Act, which resulted in Google and YouTube paying a significant fine. These actions demonstrate the impact civil society organizations can have in holding tech companies accountable for their data protection practices.

Community-based human rights impact assessments are crucial for ensuring child-centred data protection. This involves consulting with companies, working with technical and legal experts, and including meaningful consultation with children. By involving children in the process, civil society organizations can better understand the implications of data processing and ensure that their rights and interests are taken into account.

Civil society organizations should also involve children in data governance. Involving children in activities such as data subject access requests can help them understand the implications of data processing and empower them to participate in decision-making processes. Additionally, auditing community-based processes involving artificial intelligence could involve older children, allowing them to contribute to ensuring ethical and responsible data practices.

Education about data processing and its impacts is crucial for meaningful child involvement. It is important for people, including children, to understand the implications of data governance for their rights. Practical activities, like writing to a company to request their data, can be incorporated into education to provide a hands-on understanding of the subject.

Civil society organizations need to collaborate with experts for effective child involvement. In complex assessments, a wide range of expertise is required, including academics, technologists, and legal experts. By collaborating with experts, civil society organizations can ensure that their efforts are based on sound knowledge and expertise.

Age verification should not be the default solution for protecting minors’ data. Other non-technical alternatives should be investigated and considered. Different jurisdictions have differing views on the compliance of age verification products with privacy laws, highlighting the need for careful consideration and evaluation of such solutions.

In efforts to protect children’s data, it is essential to centre the most vulnerable and marginalised children. Children are not a homogeneous group, and it is important to address the varying levels of vulnerability and inclusion across different geographies and demographics.

Designing products for the edge cases and risky scenarios is crucial for digital safety. Afsaneh Rigo’s work on inclusive design advocates for designing from the margins, as this benefits everyone. By considering the most difficult and risky scenarios, civil society organizations can ensure that digital products and platforms are safe and accessible for all.

In conclusion, civil society organizations have a vital role to play in championing child-centred data protection. Through advocacy, litigation, regulatory requests, human rights impact assessments, involvement in data governance, education, collaboration with experts, exploring non-technical alternatives to age verification, considering the needs of the most vulnerable children, and designing for edge cases, these organizations can contribute to a safer and more inclusive digital landscape for children.

Theodora Skeadas

The discussion revolves around several key issues related to children’s data protection and legislation. One focal point is the importance of understanding international children’s rights principles, standards, and conventions. The UN Convention on the Rights of the Child features prominently as a widely ratified international human rights treaty that enshrines the fundamental rights of all children under the age of 18, serving as a foundational document in safeguarding children’s rights.

Another significant aspect highlighted is the need for appropriate data collection, processing, storage, security, access, and erasure. It is emphasized that organizations should only collect data for legitimate purposes and with the consent of parents and guardians. Moreover, these organizations should use children’s data in a way that is consistent with their best interest. Implementing adequate security measures to protect children’s data is also underscored as crucial.

Consent, transparency, data minimization, data security, and profiling are identified as major issues surrounding personal data collection, processing, and profiling. It is mentioned that children may not fully understand what it means to consent to the collection and use of their personal data. Additionally, organizations may not be transparent about how they collect, use, and share children’s personal data, making it difficult for parents to make informed decisions. The over-collection of personal data by organizations is also highlighted as a concern.

The need for strengthening legal protection, improving transparency and accountability, as well as designing privacy-enhancing technologies, is emphasized as ways to address the issues related to children’s data. Governments can play a role in strengthening legal protections for children, such as requiring parental consent and prohibiting organizations from profiling children through targeted advertising. It is also mentioned that educating parents and children about the risks and benefits of sharing personal data online is crucial. Technologists are encouraged to design products and services that collect and use less personal data from children.

There is a global focus on legislation discussions that will impact child safety. Measures such as the Digital Services Act and Digital Markets Act in the European Union, as well as the UK online safety bill, are mentioned as examples of legislation that will have an impact on child safety.

In the context of the United States, there is a gap in legislation related to assistive education technology (ed tech) in schools. Existing bills mostly focus on access, age verification, policies, and education, rather than addressing the usage of assistive technology.

There is also concern about the challenges faced in passing comprehensive legislation related to children’s data, particularly due to competing interests and a divided political landscape. It is acknowledged that despite the proliferation of data and data-related issues concerning children, passing effective legislation proves difficult.

The dataset analysis also reveals the need to educate legislators about the rights and principles of children. Often, legislators may not be adequately informed about the rights of children and the specific meaning of rights like privacy and freedom of expression in the context of children.

The importance of including children in decision-making processes is emphasized as it makes legislation child-centric and serves the intended purpose well. Inclusion of children in the legislative process ensures that their voices and perspectives are heard and considered.

The analysis also highlights the necessity of considering the needs of children from diverse backgrounds. It is crucial to acknowledge and address the unique challenges and requirements of children from different social, cultural, and economic circumstances.

Furthermore, the inclusion of children as active participants in conversations about their well-being is stressed. This can be done through their participation in surveys, focus groups, workshops, and empowering them to advocate for themselves in the legislative process.

There is a suggestion for children to be represented on company advisory boards, emphasizing the importance of their inclusion and representation in corporate governance.

In conclusion, the discussion delves into various aspects of children’s data protection and legislation, shedding light on key issues and suggestions for addressing them. It emphasizes the significance of understanding international children’s rights principles, implementing appropriate data collection and processing practices, ensuring transparency, accountability, and consent, and designing privacy-enhancing technologies. Additionally, it highlights the importance of including children in decision-making processes, considering their diverse needs, and strengthening legal protection. However, there is recognition of the challenges posed by political division and the difficulties in passing comprehensive legislation.

Njemile Davis-Michael

During the discussion, various topics relating to data governance and the impact of digital technology on protecting children’s rights and promoting their well-being were covered. One significant highlight was the influence of the United States Agency for International Development (USAID) in technological innovation, as well as its efforts in humanitarian relief and international development. With 9,000 colleagues spanning 100 countries, USAID plays a significant role in funding initiatives to improve digital literacy, promote data literacy, enhance cybersecurity, bridge the gender digital divide, and protect children from digital harm.

Digital tools were identified as increasingly important for adults working to protect children. These tools, such as birth registration systems and case management support, help facilitate the protection and integration of children into broader social and cultural norms. However, it was acknowledged that increased digital access can also lead to increased risks, including cyberbullying, harassment, gender-based violence, hate speech, sexual abuse and exploitation, recruitment into trafficking, and radicalization to violence. The negative consequences of these risks were highlighted, such as limited exposure to new ideas, restricted perspectives, and impaired critical thinking skills due to data algorithms.

To address these risks, it was argued that better awareness, advocacy, and training for data privacy protection are crucial. The lack of informed decision-making about data privacy was identified as an issue that transfers power from the data subject to the data collector, with potentially long-lasting and harmful consequences. Recognizing the need for safer digital environments, data governance frameworks were presented as a solution to mitigate the risks of the digital world. These frameworks can create a safer, more inclusive, and more exciting future.

The importance of responsible and ethical computer science education for university students was emphasized. Collaboration between USAID and the Mozilla Foundation aims to provide such education in India and Kenya, with the goal of creating technology with more ethical social impacts. The integration of children’s rights in national data privacy laws was also advocated, highlighting the need for a legal framework that safeguards their privacy and well-being.

Empowering youth advocates for data governance and digital rights was seen as a positive step forward, with projects like Project Omna, founded by Omar, a youth advocate for children’s digital rights, gaining support and recognition. The suggestion to utilize youth networks and platforms to inspire solutions further highlighted the importance of involving young voices in shaping data governance and digital rights agendas.

The tension between the decision-making authority of adults and the understanding of children’s best interests was acknowledged. It was argued that amplifying children’s voices in the digital society and discussing digital and data rights in formal education institutions is necessary to bridge this gap and ensure the protection of children’s rights.

Notably, the need for a children’s Internet Governance Forum (IGF) was highlighted, recognizing children as stakeholders in internet governance. It was agreed that raising awareness and capacity building are essential in bringing about positive changes for children within this sphere.

In conclusion, the discussion shed light on the crucial role of data governance and digital technology in safeguarding children’s rights. It emphasized the importance of responsible technological innovation, data privacy protection, and the inclusion of children’s voices in decision-making processes. By addressing these issues, society can create a safer and more inclusive digital world for children, where their rights are protected, and their well-being is prioritized.

Moderator

The discussion on children’s privacy rights in the digital environment emphasised the importance of protecting children from data exploitation by companies. One argument raised was the need for regulatory and educational strategies to safeguard children’s privacy. Age-appropriate design codes were highlighted as a valuable mechanism for respecting and protecting children’s privacy, considering their age and understanding the link between privacy and other rights. Professor Sonia Livingstone, who was part of the drafting group for general comment number 25, stressed the need for a comprehensive approach that ensures children’s privacy rights are incorporated into the design of digital products and services.

The .Kids initiative was discussed as an example of efforts to promote child safety online. This initiative, which focuses on children’s rights and welfare, enforces specific guidelines based on the Convention on the Rights of the Child. It also provides a platform for reporting abuse and restricted content. Edmon Chung, in his presentation on the .Kids initiative, highlighted the importance of protecting children’s safety online and addressed the issue of companies exploiting children’s data.

USAID’s involvement in digital innovation and international development was also mentioned. The organisation works with colleagues in various countries and supports initiatives related to digital innovation. Their first digital strategy, launched in 2020, aims to promote technological innovation and the development of inclusive and secure digital ecosystems. USAID is committed to protecting children’s data through initiatives such as promoting awareness, aligning teaching methods with EdTech tools, and working on data governance interventions in the public education sector.

The discussion also brought attention to the risks children face in the digital environment, including online violence, exploitation, and lack of informed decision-making regarding data privacy. It was emphasised that digital tools play a significant role in protecting children and aiding in areas such as birth registration, family tracing, case management, and data analysis. However, the risks associated with digital tools must also be addressed.

Civil society organisations were recognised for their crucial role in advocating for child-centered data protection. They engage in advocacy related to law and policy, and their efforts have resulted in updated guidance on children’s privacy in educational settings and the investigation of violations of children’s privacy laws. The importance of involving children in data governance and policy development was highlighted, along with the need for meaningful consultation and education.

The discussion underscored the need for age verification mechanisms and risk assessments to ensure the protection of children online. The development of age verification products that comply with privacy laws was seen as a vital step. Concerns were raised regarding the lack of transparency and oversight in current age assessment methods. It was suggested that products should be designed for difficult and risky scenarios to benefit all users.

Overall, the insights from the discussion highlighted the importance of protecting children’s privacy in the digital environment and called for action to create a safer and more inclusive online space for children.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Criss-cross of digital margins for effective inclusion | IGF 2023 Town Hall #150

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Mohammad Atif Aleem

The study conducted by Atif in collaboration with the Alexander von Humboldt Institute of Internet Society sheds light on the low internet access and digital inclusion in Southeast Asian countries, particularly in Vietnam. This finding highlights the pressing need to increase internet connectivity and promote digital participation in the region. On a positive note, the study acknowledges the potential of new digital technologies in improving internet access and inclusion.

Furthermore, Atif, a research analyst at a reputable IT consulting firm, emphasizes the importance of addressing digital access for disadvantaged groups in India. The study reveals that only 29% of rural areas in India have internet penetration, indicating a significant digital divide. The Digital India and Skill India initiatives have been implemented to improve access and bridge this gap. However, there remains a concern for the digital inclusion of disadvantaged groups, underscoring the need for innovative approaches.

In order to expand high-speed internet connectivity in remote or inaccessible areas, the study suggests exploring innovative solutions. Examples provided include Google’s Internet Saathi initiative, which aims to provide internet access to rural women through community networks. Additionally, the use of low earth orbit satellites, community radios, and collaborations between major integrators of digital networks and organizations such as MIT Sloan India Lab are highlighted as potential tools to overcome challenges in expanding connectivity.

The study also recognizes the importance of inclusive technology for people with disabilities. Carlos Pereira’s Livox app is highlighted as a prime example of inclusive technology, as it was deemed the best inclusion app by the United Nations. Developed for Clara, Pereira’s daughter with cerebral palsy, the app has since been adopted by individuals with various disabilities.

Collaborations between private entities, governments, and other companies are considered necessary for significant impact on digital activities and inclusion. The study cites examples of Google consulting the government of India and collaborating with Facebook for its Internet Saathi program, further emphasizing the importance of public-private partnerships.

Entrepreneurs are encouraged to explore various modes of partnerships, including seeking guidance from academia and participating in internet governance schools. These collaborations can provide valuable insights and expertise in navigating the digital landscape and promoting digital inclusion.

To support digital inclusion efforts, the study suggests funding sources such as NGOs, such as the Internet Society, as well as participation in hackathons by IT software firms. These initiatives can provide resources and support necessary to address the challenges and barriers to digital inclusion.

In conclusion, the study highlights the low internet access and digital inclusion in Southeast Asian countries, particularly Vietnam, underlining the urgent need for increased connectivity and participation. It explores various approaches such as new digital technologies, inclusive technology for people with disabilities, innovative solutions for remote areas, collaborations between different stakeholders, and funding sources to address these challenges and achieve digital inclusion.

Anna

The discussions focused on the barriers that marginalised youth face in internet governance and the importance of inclusive participation. It was highlighted that these barriers stem from various social, economic, political, and cultural contexts. By identifying and understanding these factors, it becomes possible to develop effective practices and policies that promote digital inclusion.

One of the key points made was the need for concerted efforts to navigate and dissolve these barriers. It was emphasised that a collective approach is necessary to achieve the inclusive participation of marginalised youth in internet governance. Participants stressed the importance of unpacking these factors comprehensively in order to recognise and address the solutions that address the issue as a whole.

Anna expressed concern regarding digital access and participation barriers specific to certain regions. Unfortunately, no further details or supporting facts were provided on this topic, but it indicates that there are unique challenges faced by marginalised youth in different geographical areas.

Another important area of interest was strategies and practices that promote meaningful participation for young people in internet governance. Participants discussed the significance of engaging young people in decision-making processes and ensuring their voices are heard. It was recognised as a positive step towards reducing inequalities and empowering young individuals to actively contribute to internet governance. Unfortunately, no specific strategies or practices were mentioned in the provided information.

The discussions also touched upon the importance of multi-stakeholder cooperation in advancing the inclusion and participation of young people in internet governance. Successful initiatives were highlighted, involving collaborations between the private sector and government to boost participation. It was considered ideal to have stakeholders from multiple sectors working together to address the challenges faced by marginalised youth.

In conclusion, the discussions highlighted the barriers faced by marginalised youth in internet governance, such as social, economic, political, and cultural factors. The importance of mapping these factors and developing comprehensive solutions to promote digital inclusion was emphasised. It was acknowledged that concerted efforts and a multi-stakeholder approach are necessary to enable the inclusive participation of marginalised youth in internet governance. However, more specific strategies and practices need to be explored to achieve meaningful participation and address region-specific challenges.

Pavel Farhan

The analysis includes several speakers discussing different aspects of internet access and inclusion. One of the main voices in this discussion is Pavel, a program officer at the Asian Institute of Technology. Pavel’s work is heavily grounded in technology and academia, and he also represents civil society. He is passionate about promoting equal internet access for minority groups and believes in the importance of youth participation in internet governance. Pavel strives to create opportunities for inclusive internet access and highlights the significance of youth involvement in the multi-stakeholder process.

Another topic highlighted in the analysis is the significant barriers to digital access faced by underprivileged and underrepresented groups in Bangladesh. These barriers include limited internet infrastructure in rural areas, prohibitive costs of internet access for those in low-income communities, lack of digital literacy skills, and the language barrier, as not all online content is available in the primary language of Bangladesh, Bangla. These challenges have a drastic impact on the digital inclusion of vulnerable communities.

However, there are government-led initiatives that aim to address these barriers. The ‘InfoLadies’ programme, for instance, involves women travelling to rural areas to provide internet services, thus improving digital literacy and access. Additionally, the ‘Bcash’ mobile finance initiative has provided opportunities for people without traditional bank accounts to engage in digital transactions, promoting economic inclusion. These initiatives play a crucial role in bridging the digital divide and ensuring that underprivileged individuals have access to the digital world.

Educational institutions are identified as key players in reducing the digital divide and fostering internet governance literacy among youth. While there is a push for more digital literacy in general, there is not enough focus on specific courses teaching internet governance. The analysis stresses the importance of equipping students with the necessary skills to navigate the online world and understand the implications of their digital actions. It suggests that universities should foster leadership and create opportunities for students to advocate for their online rights by hosting forums, clubs, and events related to digital inclusion and governance.

Furthermore, universities contribute to addressing the digital divide by conducting research and gathering data on internet access and usage. This research helps identify gaps in access and usage, allowing policymakers to make informed decisions. Universities can also play a vital role in equipping students with essential digital skills through structured programs.

Overall, the extended analysis showcases the importance of various stakeholders, including individuals like Pavel, government initiatives, and educational institutions, in promoting equal access to the internet and fostering digital literacy. It highlights the need for collaboration and multi-stakeholder involvement to bridge the digital divide and ensure that underprivileged and underrepresented groups have equal opportunities in the digital world.

Jaewon Son

The analysis of the given statements highlights several important points raised by multiple speakers. Jeewon, for example, emphasizes the significance of including citizens and people in policymaking and urban development. This belief is supported by her PhD research at the Karlsruhe Institute of Technology, which focuses on this very topic. Furthermore, Jeewon also recognizes the connection between internet governance and social/environmental issues. Her experience with the Asia Pacific Internet Governance Program has led her to understand that internet governance is not only a technological concept but also relevant to daily life and social and environmental issues.

In addition to these points, Jeewon advocates for the inclusion and increase of youth and citizen participation in internet-related matters. However, there are no specific supporting facts provided for this argument. Nevertheless, it can be inferred that Jeewon believes that the active involvement of young people and citizens in internet governance is essential for reducing inequalities and promoting industry and innovation.

Another notable observation made in the analysis is the emphasis on digital needs and stakeholder participation in advanced internet environments, particularly in South Korea. The supporting facts mentioned include the country’s strong internet connection and high smartphone ownership. However, it is also noted that while basic digital needs are met in South Korea, stakeholder participation is an additional stage that needs to be achieved. This suggests that there is a need for increased engagement and involvement of stakeholders in shaping internet governance policies.

Furthermore, the analysis brings attention to the impact of cultural barriers and gender imbalance on stakeholder participation in internet governance discussions. In the Korea Internet Governance Committee, for instance, Jaewon Son was the only youth and one of the few women representatives, while most participants were male IT professors. This observation highlights the need for addressing cultural and gender disparities to achieve more inclusive and diverse stakeholder involvement.

The analysis also points out a negative factor affecting youth commitment to internet governance – concerns about job security. Many Korean youths, it is mentioned, quit involvement in internet governance due to fears of not securing a job in their field. This suggests that job security is a significant barrier to sustained youth participation in internet governance initiatives.

Lastly, the need for more understanding and opportunities in internet governance for individuals from different backgrounds is highlighted. The speaker expresses the belief that skills learnt in internet governance can be beneficial in various fields outside of IT. It is also argued that it is important for more people to understand what internet governance is about. As such, the speaker supports the idea of promoting internet governance education and creating more accessible opportunities for individuals with diverse majors and backgrounds.

In conclusion, the analysis reveals the importance of including citizens and people in policymaking and urban development, as well as the connection between internet governance and social/environmental issues. It underscores the need for increased youth and citizen participation in internet-related matters and emphasizes the significance of meeting both digital needs and stakeholder involvement in advanced internet environments. The impact of cultural barriers, gender imbalance, and job security concerns on stakeholder participation is also highlighted. Furthermore, the analysis brings attention to the importance of more understanding and opportunities in internet governance for individuals from different majors and backgrounds. Overall, the insights gained from the analysis shed light on various aspects of internet governance and its implications for inclusive and sustainable development.

Audience

Throughout the conversation, there was repeated emphasis on the act of saying goodbye, with multiple individuals expressing their intention to leave. This repetition not only served as a common theme, but also underscored the significance of this action. The frequent utterance of “bye” could suggest a desire for closure or a need to conclude the discussion. It could also indicate a sense of politeness and respect among the participants, as they take the time to bid farewell before departing.

Furthermore, the repetition of “bye” might indicate a strong emotional connection among the conversationalists, as they repeatedly express their desire to part ways. It could be seen as a way of acknowledging the shared experience and expressing gratitude for the interaction. This repetition in saying goodbye could serve as a gesture of goodwill, reinforcing the positive nature of the discussion.

One could also interpret the repeated “bye” as a form of social ritual or convention. In many cultures, it is customary to exchange pleasantries and bid farewell before leaving a conversation or gathering. By adhering to this cultural norm, the speakers demonstrate their adherence to social etiquette and appropriate behavior.

In conclusion, the repeated use of “bye” during the conversation serves as a common and notable theme. It signifies the desire for closure, politeness, emotional connection, and adherence to social conventions. This emphasis on saying goodbye reinforces the cordial and respectful nature of the interaction, underscoring the importance placed on proper communication and social etiquette.

Tatiana Houndjo

Tatiana Houndjo is an IT professional from the Benin Republic in West Africa. She works as an IT system and infrastructure engineer in a private company with branches in Ivory Coast, Niger, and Togo. Her role involves helping businesses and governments implement digital technologies as part of their processes. Tatiana provides support and guidance in the adoption of digital tools and technologies, ensuring their efficient integration into existing systems, and assisting in the resolution of technical issues.

In addition to her work in the IT field, Tatiana is actively involved in the internet governance ecosystem. She was selected for the Women’s DNS Academy Fellowship in 2018, which marked the beginning of her journey in this domain. Since then, she has led various projects and programs to promote women’s participation in internet governance. Her efforts were recognized, and she was elected as the vice chair for a two-year term.

Tatiana firmly advocates for the importance of digital tools and technologies in today’s world. She believes that embracing these tools and technologies is essential for businesses and governments to stay competitive and drive innovation. Her work focuses on assisting organizations in implementing these tools and technologies to enhance productivity, efficiency, and overall performance.

However, Tatiana also highlights the need to consider the hierarchy of needs for young people. She acknowledges that many young individuals struggle with basic needs and are unable to actively participate in internet governance discussions. It is challenging for them to engage when their basic needs, such as access to food and shelter, are not met. Therefore, initiatives must address these fundamental needs before expecting their active participation.

Furthermore, Tatiana stresses the need for meaningful participation of young people in the internet governance ecosystem. She believes that their insights and perspectives are valuable and should be considered in decision-making processes. She advocates for partnerships between stakeholders to create inclusive environments that empower young people to contribute and have their voices heard.

An important challenge highlighted by Tatiana is the inequality in internet usage. There is a clear divide between those who have access to the internet and information and those who do not. Additionally, there is a discrepancy in the efficient use of the internet. Bridging this divide is crucial to achieve SDG 9 (Industry, Innovation, and Infrastructure) and SDG 10 (Reduced Inequalities). Efforts should be made to ensure equitable access to the benefits of the internet.

Lastly, Tatiana raises concerns about the lack of meaningful data to monitor and evaluate actions in the internet governance ecosystem. She emphasizes the need for young people, private companies, and governments to collect relevant data that can provide insights into internet usage and its impact. The Internet Society’s initiative, Internet.Beijing, is an example of a project aimed at monitoring internet usage. Such initiatives are essential for informed decision-making and evidence-based actions.

In conclusion, Tatiana Houndjo, an IT professional and an active participant in the internet governance ecosystem, advocates for the importance of digital tools and technologies. She supports businesses and governments in implementing these tools and technologies. However, she also recognizes the need to address the hierarchy of needs for young people and ensure their meaningful participation in internet governance discussions. Additionally, she highlights the inequality in internet usage and the lack of meaningful data to monitor and evaluate actions. By addressing these challenges, stakeholders can work towards achieving SDG 9 and SDG 10, promoting industry, innovation, infrastructure, and reduced inequalities.

Rashad Sanusi

Rashad Sanusi, a technical support at Digital Grassroots, is taking the initiative to commence a discussion centered around the crucial topics of digital inclusion and Internet Governance. This discussion will involve four speakers who will share their personal experiences and insights on the issue of digital inclusion within their respective communities. Through this, Rashad aims to shed light on the barriers to internet access and explore potential solutions in order to promote widespread inclusivity.

Rashad’s emphasis on understanding the barriers to internet access highlights the need for a comprehensive understanding of these challenges and finding ways to overcome them. By delving into the root causes of limited internet access, Rashad aims to generate discussion and brainstorm practical strategies that can empower individuals and communities to navigate and overcome these hurdles effectively.

Moreover, Rashad’s goal is to foster an interactive and inclusive environment during the discussion. This creates an atmosphere where participants feel encouraged to contribute and exchange ideas freely. By promoting dialogue and collaboration, Rashad seeks to cultivate an atmosphere that is conducive to exploring innovative approaches to digital inclusion.

Rashad’s advocacy for inclusivity in Internet Governance signifies the importance of ensuring that everyone’s voice is heard, especially those at the grassroots level. He believes that by comprehensively understanding the challenges faced by individuals in these communities, policies and initiatives can be developed that align with their needs. Rashad contends that through inclusivity, the decision-making process will be more representative and effective in addressing the collective needs of all stakeholders involved.

In conclusion, Rashad Sanusi’s discussion on digital inclusion and Internet Governance aims to tackle the barriers to internet access and promote inclusivity. By bringing together speakers to share their experiences and perspectives, Rashad hopes to foster an interactive and inclusive environment that facilitates collaboration and generates innovative solutions. Through his advocacy for inclusivity in Internet Governance, Rashad emphasizes the need to consider the voices of those at the grassroots level, ensuring their needs are prioritized in decision-making processes.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Conversational AI in low income & resource settings | IGF 2023

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Dino Cataldo Dell’Accio

In this analysis, several key points and arguments about AI applications in healthcare, the potential of AI and chatbots in low-resource settings, the concept of trust in AI and digital technologies, and the need to establish frameworks for evaluating the reliability and trustworthiness of AI solutions are discussed.

Firstly, the importance of user identification in AI applications in healthcare is emphasised. The use of facial recognition for digital identity is highlighted as an effective solution implemented for the United Nations Pension Fund. This demonstrates how advanced technologies like AI can be utilised to enhance security and streamline processes within healthcare systems.

Additionally, the potential of AI and chatbots in low-resource settings is acknowledged. The analysis suggests that these technologies have the ability to address resource limitations and reduce inequalities in healthcare access. To support this argument, a blockchain solution designed and implemented for the United Nations Pension Fund is mentioned. The use of blockchain technology can provide secure and transparent data management, enabling efficient delivery of healthcare services in low-resource settings.

The concept of trust is recognised as crucial in AI and digital technologies. It is argued that the public should have confidence in the solutions and entities that offer these technologies. The analysis highlights the importance of not burdening individuals with technological details, but rather fostering trust in the overall solution. Trust is seen as a vital factor in promoting widespread adoption and acceptance of AI and digital technologies.

Furthermore, the need to establish frameworks for evaluating the reliability and trustworthiness of AI solutions is emphasised. The analysis suggests that not all solutions have the same level of reliability, and there is a need to develop criteria for comparing and contrasting different AI solutions. This would enable the identification of trustworthy and reliable solutions that can be implemented effectively. The speaker believes that such frameworks will promote accountability and transparency in the AI industry.

In conclusion, this analysis brings attention to various critical aspects of AI applications in healthcare, the potential of AI and chatbots in low-resource settings, the concept of trust in AI and digital technologies, and the need for frameworks to evaluate the reliability and trustworthiness of AI solutions. It underscores the importance of user identification, the potential of advanced technologies in addressing resource limitations, and the value of trust in fostering widespread adoption. Furthermore, it highlights the necessity of establishing criteria for evaluating and selecting reliable AI solutions, promoting accountability and transparency in the industry.

Olabisi Ogunbase

Digital patient engagement is crucial for maintaining relationships with patients even after they leave the hospital. Platforms like WhatsApp play a vital role in this aspect. WhatsApp is a powerful digital tool that enables ongoing interaction between healthcare providers and patients. It allows doctors, nurses, dieticians, and social workers to provide guidance and answer patient questions. This continuous engagement helps prevent relapses and educates patients about their health conditions. WhatsApp also serves as a platform for passing on education and notices, and as a support system for patients to share ideas and support each other. However, there are some limitations with the WhatsApp platform, such as delays in response and lack of personalization. Implementing AI in healthcare communication, specifically conversational AI, could address these issues and provide real-time, appropriate responses. Collaboration and knowledge-sharing are essential for driving innovation in healthcare, particularly as technology continues to advance. By working together, we can improve digital patient engagement and achieve better healthcare outcomes.

Rajendra Pratap Gupta

Conversational AI is emerging as a promising solution to improve accessible healthcare in low-income and low-resource settings. A study showed that Conversational AI scored 81% in the MRCGP, surpassing human physicians who scored 72%. This highlights the potential of AI to enhance healthcare delivery and bridge gaps caused by the lack of qualified doctors and inadequate healthcare infrastructure. AI in healthcare is aligned with SDG 3 (Good Health and Well-being) and SDG 9 (Industry, Innovation, and Infrastructure).

However, there are concerns about awareness and implementation of Conversational AI in low-resource settings. Some digital health professionals are unfamiliar with its concept and potential applications. This lack of awareness might hinder successful implementation.

Rajendra Pratap Gupta supports using voice-based data through Conversational AI to increase the accuracy and volume of health data, leading to improved healthcare outcomes. Collaboration and a user-centric approach are crucial in AI implementation. Involvement of different sectors, including the private sector, is vital for sustainable business models. The WHO, ITU, and WIPO play significant roles in facilitating AI implementation.

Addressing the digital divide is important, as 2.6 billion people globally lack reliable internet access, hindering effective AI implementation. Efforts should be made to increase internet access in underserved areas.

Education in AI and robotics is necessary, with initiatives in place to develop courses for students and train frontline health workers. This will create a skilled workforce to utilize AI technologies effectively.

The debate on regulation in AI continues, with some advocating for guidelines over over-regulation to maintain flexibility and ethical standards while promoting innovation.

In conclusion, Conversational AI shows great potential in improving accessible healthcare in low-income and low-resource settings. It requires awareness, collaboration, and efforts to address the digital divide and provide education in AI and robotics. Finding the right balance between regulation and innovation is crucial. By addressing these issues, AI can play a significant role in advancing healthcare and achieving the Sustainable Development Goals.

Sameer Pujari

In this analysis, the speakers focus on the transformative potential of technology, specifically conversational artificial intelligence (AI), in addressing existing gaps in healthcare services. They assert that these gaps, particularly in low middle-income settings, can be effectively tackled through the implementation of technology. The argument put forward is that technology, especially conversational AI, serves as an enabler in bridging the healthcare divide.

One important observation made by the speakers is the need for a people-focused, collaborative, equitable, and sustainable approach when integrating technology in healthcare. They emphasize the importance of considering the specific needs of individuals and communities, as well as fostering collaboration between various stakeholders. In addition, they stress the importance of ensuring that the benefits of technology are accessible to all, regardless of socioeconomic status.

The World Health Organization (WHO) plays a crucial role in this conversation by providing guidance and support for the effective implementation of AI in healthcare. The speakers highlight WHO’s efforts in maximizing the value of AI in healthcare through initiatives such as the global collaboration with the International Telecommunication Union (ITU) and the World Intellectual Property Organization. These efforts aim to harness the potential of AI to improve global health outcomes.

Ethics and regulations emerge as important considerations in the implementation of AI in healthcare. The speakers stress the need for ethical approaches to AI development and deployment, ensuring that the technology is used in a responsible and beneficial manner. They also highlight the importance of regulations to provide guardrails and prevent potential misuse of AI. However, it is asserted that regulations should not stifle innovation but instead strike a balance between regulation and technological advancement.

Education and training play a significant role in achieving responsible AI implementation. The WHO offers courses on ethics and governance of AI to promote understanding and ethical approaches among developers, policymakers, and implementers. These courses aim to equip individuals with the necessary knowledge and skills to navigate the complex ethical considerations surrounding AI implementation.

In conclusion, the analysis underscores the potential of conversational AI in addressing healthcare gaps and improving global health outcomes. A people-focused, collaborative, equitable, and sustainable approach is deemed essential in effectively implementing technology in healthcare. The WHO’s guidance and support, along with the development of educational courses, ensure that AI is deployed ethically and responsibly. It is evident that harnessing the potential of AI requires a well-balanced approach that brings together technology, ethics, regulations, and education for the betterment of healthcare systems worldwide.

Mevish Vaishnav

Conversational AI has the potential to revolutionize the healthcare industry by analysing health conversations and generating valuable insights and decisions. This presents an incredible opportunity to gather and analyze health data from billions of people and clinicians, leading to more effective healthcare outcomes. Supporters argue that Conversational AI can be the starting point for generating health AI. By leveraging the power of Conversational AI, healthcare professionals can better understand patient needs and tailor treatment plans accordingly.

Conversational AI also addresses the lack of access to basic health information, particularly in rural areas. Many people living in remote or underserved locations struggle to access crucial information about their health. Conversational AI can bridge this gap by providing easy-to-understand and readily accessible information. Advocates argue that generative AI could eliminate the need for doctors to address basic health problems.

The potential of implementing Conversational AI and generative health AI is widely recognised. However, no supporting facts are provided to elaborate on this stance.

Conversational AI is also seen as a powerful tool in patient engagement and health-related education. The effort required in typing and texting often hinders effective communication between healthcare providers and patients. However, Conversational AI streamlines this process by allowing patients to converse naturally, making them feel heard and fostering a better doctor-patient relationship.

Advocates propose the creation of a global generative health AI group under the stewardship of Dr. Gupta. This group would bring together stakeholders, regulators, policymakers, doctors, hospitals, and frontline health workers to set a direction for all involved. This initiative is supported by the belief that the United Nations, as the largest multi-stakeholder and multilateral body, is in a prime position to facilitate this collaboration. This would promote partnerships and support SDG3 (Good Health and Well-being) and SDG17 (Partnerships for the Goals).

The Academy of Digital Health Sciences is working on a report about generative health intelligence. This report aims to explore the role of generative health intelligence in shaping the future of healthcare. While further details about the report’s content or expected release date are not provided, it is expected to contribute to advancements in healthcare intelligence.

Training and deployment of generative AI in healthcare are emphasized as crucial. Understanding how generative AI works and developing the necessary skills are essential for effectively utilizing this technology. The positive sentiment towards this necessity stems from recognizing the potential benefits of generative AI in improving healthcare outcomes. However, no specific evidence is provided to further support this argument.

In conclusion, Conversational AI has the potential to transform healthcare by analyzing health conversations, delivering information in remote areas, enhancing patient engagement, and facilitating health-related education. The establishment of a global generative health AI group, the training and deployment of generative AI, and the ongoing work by the Academy of Digital Health Sciences highlight the need to fully harness the potential of this technology. Further supporting evidence and details would strengthen the arguments presented.

Shawnna Hoffman

During the discussion, the potential of conversational AI to bridge the healthcare gap was highlighted as a significant advantage. The ability of AI to provide 24/7 assistance and access to healthcare globally, through mobile phones, was emphasized. This can greatly benefit individuals in remote areas or those who may have limited access to healthcare services. The convenience and availability of AI-based healthcare assistance can help address health disparities and provide support to individuals in need.

The combination of AI with blockchain technology was also discussed as an efficient solution during crisis situations. It was mentioned that during the COVID-19 pandemic, an AI chatbot combined with blockchain technology helped locate over 10 billion pieces of personal protective equipment (PPE) within the first 24 hours. This demonstrates the potential of AI and blockchain to rapidly respond to critical needs and find effective solutions in times of crisis.

The importance of fact-checking AI and ensuring its accuracy was emphasized. Even though AI is probabilistic and not always correct, it is crucial to verify the information provided by AI systems. One of the speakers, the president of Guardrail Technologies, highlighted the need to put guardrails around AI and fact-check generative AI to ensure its reliability and accuracy. This point stresses the importance of being cautious and critical when relying on AI-generated information.

The discussion also raised awareness about the issue of internet access and connectivity for AI solutions to be effective. It was mentioned that 2.6 billion people globally lack internet access, which significantly hinders the overall success and reach of AI solutions like chatbots. Ensuring internet access for all individuals, especially those who currently lack it, is necessary to fully harness the benefits of AI and provide equitable access to its solutions.

A holistic approach that considers individual needs, even in remote locations, was emphasized. The experience from an IBM Watson project was shared, where access points were set up in various villages, allowing people to reach these points in half a day and gain access to medical information. This approach recognizes the importance of tailoring AI solutions to meet the specific needs of individuals regardless of their location or resources.

Lastly, the speakers acknowledged the complexity of implementing AI solutions on a wide scale. It was acknowledged that the challenge extends beyond just conversational AI and that the complexity of the problem makes it difficult to implement AI solutions effectively. This realistic perspective highlights the need for careful planning, research, and collaboration to overcome these implementation challenges.

In conclusion, the potential benefits of conversational AI in bridging the healthcare gap, providing 24/7 assistance, and access to healthcare globally through mobile phones were discussed. The combination of AI with blockchain technology was seen as an efficient solution during crisis situations. The importance of fact-checking AI and ensuring its accuracy, considering internet access and connectivity, adopting a holistic approach, and addressing the challenges of implementing AI solutions were all key points discussed during the session. Overall, the speakers expressed optimism about the potential of AI while also acknowledging the complexities and challenges that need to be addressed for its successful integration.

Sabin Dima

Artificial intelligence (AI) is widely recognised as a powerful tool that can replace certain skills, while still acknowledging the importance of human involvement. It is acknowledged that AI can outperform humans in certain tasks, offering greater efficiency and accuracy. Notably, humans.ai, led by the CEO and Founder, has achieved significant milestones in AI development, including creating the first AI counselor for a government and an AI capable of real-time conversations with 19 million Romanians. These accomplishments demonstrate the transformative potential of AI across various domains.

Data traceability and ethics are emphasised as critical considerations in AI development. The CEO’s firm has developed the first blockchain of artificial intelligence to ensure transparency and accountability in AI systems. Additionally, they have contributed to research papers on the ethical implications of AI, emphasising the need to address these concerns.

In the context of healthcare, the CEO argues for a bidirectional approach to AI, aiming to understand people’s problems and provide effective solutions. Emphasising human-like interaction, the CEO advocates for grasping individuals’ problems and urgency. They envision an open innovation platform that fosters collaboration and comprehensive problem-solving.

While technology itself is not the issue, optimising its usage is crucial. The CEO suggests that resources for experimenting with AI projects are readily available to everyone. The focus should be on tackling real-world challenges and driving innovation across sectors.

Furthermore, the CEO asserts that trust can be bolstered in healthcare through the implementation of AI solutions. For instance, the CEO references a project where they cloned a doctor’s voice to send audio messages to patients, enhancing patient care and building trust.

To better understand and regulate AI, the CEO proposes real-world experimentation. By implementing AI solutions in specific regions, regulators can gain insights and make informed decisions on regulations and policies.

The urgency for action and application of AI is evident throughout the discussion. The CEO highlights the readiness of technology and the availability of skilled professionals passionate about AI. Encouraging seizing the opportunities presented by AI rather than merely contemplating its potential is emphasised.

In the conversational AI domain, the CEO suggests making the technology more accessible to underserved populations in low-income areas. By developing efficient models that can run on mobile phones, conversational AI can bridge gaps in healthcare access.

Finally, AI is portrayed as a beneficial tool for employment, increasing productivity and reducing human error. The CEO suggests that AI can supervise performance and mitigate errors, potentially enabling employees to work fewer days while achieving greater results.

In conclusion, AI is a powerful tool capable of replacing certain skills but not humans. The CEO and their firm exemplify the transformative potential of AI across various domains. Ethical considerations, data traceability, bidirectional approaches in healthcare, effective technology utilization, trust-building, real-world experimentation, accessibility, and increased productivity are crucial aspects guiding the application and development of AI. The overall sentiment strongly favours embracing AI to drive positive change in multiple sectors.

Ashish Atreja

Generative AI and AI technologies have the potential to revolutionise the provision of medical care by overcoming the limitations of time and location, extending healthcare access to a larger number of people, irrespective of their physical location. The use of generative probabilistic models in combination with rule-based care plays a crucial role in bridging the gap between scientific treatments and patients’ understanding.

Addressing healthcare inequity requires collaboration and the appropriate use of technology. Inequities exist not only among patients but also among countries, states, and healthcare organisations. Through collaborative efforts and leveraging technology, healthcare can be democratised, ensuring equal access to quality care for everyone.

AI technologies can bridge the digital divide in healthcare. Existing care solutions have the potential to become global solutions if properly validated. Humans play a vital role as transformation agents in bridging this gap, working collectively across silos to ensure inclusivity in healthcare.

Prominent figure Ashish Atreja advocates for a global thought leadership group on generative AI in healthcare. He believes in the power of collective work and engaging with global partners to drive advancements in healthcare systems. Collaborating and sharing knowledge can contribute to the development and implementation of generative AI solutions worldwide.

Conversational AI has the potential to dispel healthcare fallacies by providing accurate and reliable information. However, it is crucial that the technology behind conversational AI is based on validated and trustworthy sources. The FDA has a tiered system for validating health-related technologies based on their potential risk, ensuring their reliability and safety.

To ensure the accuracy and effectiveness of conversational AI in healthcare, an automated or semi-automated governance framework is needed. Currently, there is no specific framework to regulate the validation of conversational AI in healthcare. Establishing such a framework would help maintain the accuracy and credibility of conversational AI, benefiting patients and healthcare providers.

In conclusion, generative AI and AI technologies have the potential to revolutionise healthcare provision, extending care to more people while overcoming limitations of time and location. Collaboration, inclusivity, and validation of technologies are crucial in addressing healthcare inequity and bridging the digital divide. Through collective work, the creation of a global thought leadership group, and the implementation of an effective governance framework, the potential of AI in healthcare can be fully realised, improving outcomes for patients worldwide.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Cybersecurity regulation in the age of AI | IGF 2023 Open Forum #81

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Moderator – Daria Tsafrir

During the discussions, three main topics were examined in depth. The first topic focused on the concerns of the government regarding the protection and safety of critical infrastructures and supply chains. It was acknowledged that governments have a major role in ensuring the security of crucial infrastructures and supply chains, which are vital for the functioning of industries and economies. However, no specific supporting facts or evidence were provided to substantiate these concerns.

The second topic revolved around the risks of over-regulation and the dynamic nature of AI. Participants expressed the need to strike a balance between regulating AI to prevent potential negative consequences and allowing for its innovative and transformative potential. The dynamic nature of AI poses a challenge in terms of regulation, as it constantly evolves and adapts. Again, no supporting facts were provided to further illustrate these risks, but it was acknowledged as a valid concern.

The third topic that was discussed focused on cybersecurity challenges. It was highlighted that addressing these challenges requires collaboration within international forums and the possibility of establishing binding treaties. The need for such cooperation arises from the global nature of cyber threats and the shared responsibility in mitigating them. However, no supporting evidence or specific examples of cybersecurity challenges were referred to.

Throughout the discussions, all speakers maintained a neutral sentiment, meaning they did not express strong support or opposition to any particular viewpoint. This could indicate that the discussions were conducted in an objective manner, with an emphasis on highlighting different perspectives and concerns rather than taking a definitive stance.

Based on the analysis, it is evident that the discussions centered around key areas of government concerns, the risks associated with over-regulation of AI, and the need for international cooperation in addressing cybersecurity challenges. However, the absence of specific supporting facts or evidence detracts from the overall depth and credibility of the arguments presented.

Moderator 1

During his presentation, Abraham introduced himself and verified that he was audible. He provided a comprehensive overview of his background and experience, emphasising his expertise in the field. Abraham highlighted his various roles within the industry, acquiring a diverse set of skills and knowledge in the process.

Abraham also detailed his educational qualifications, underscoring his pertinent degrees and certifications. He explained how these qualifications have equipped him with a strong theoretical foundation, complemented by practical skills developed through hands-on experience.

In addition, Abraham outlined his past work experiences and accomplishments, showcasing specific successful projects and the positive outcomes they generated. He shared examples of challenges encountered during these projects and how he overcame them, displaying problem-solving abilities and resilience.

Regarding communication skills, Abraham mentioned his experience working with multicultural teams and effectively collaborating with individuals from diverse backgrounds. He emphasized his strong interpersonal skills, enabling him to cultivate robust relationships with clients and stakeholders throughout his professional journey.

Furthermore, Abraham mentioned his commitment to continuous professional development, expressing enthusiasm for keeping abreast of the latest industry trends and advancements. He attends relevant conferences, workshops, and seminars, actively engaging in professional networks to stay connected with industry experts.

In conclusion, Abraham presented himself as a highly experienced and qualified professional, highlighting his expertise through his extensive background, educational qualifications, and successful project achievements. He demonstrated effective communication, collaboration, and adaptability, crucial in a fast-paced, ever-evolving industry.

Gallia Daor

The Organisation for Economic Co-operation and Development (OECD) has played a significant role in guiding the development and deployment of artificial intelligence (AI). In 2019, the OECD became the first intergovernmental organization to adopt principles for trustworthy AI. These principles, which focus on the aspects of robustness, security, and safety, have since been adopted by 46 countries. They also serve as the basis for the G20 AI principles, highlighting their global relevance and influence.

The OECD’s emphasis on robustness, security, and safety in AI is crucial in ensuring the responsible development and use of AI technologies. To address the potential risks associated with AI systems, the OECD proposes a systematic risk management approach that spans the entire lifecycle of AI systems on a continuous basis. By adopting this approach, companies and organizations can effectively identify and mitigate risks at each phase of an AI system’s development and deployment.

To further support the responsible development and deployment of AI, the OECD has also published a framework for the classification of AI systems. This framework aids in establishing clear and consistent guidelines for categorising AI technologies, enabling stakeholders to better understand and evaluate the potential risks and benefits associated with different AI systems.

The OECD recognises that digital security, including cybersecurity and the protection against vulnerabilities, is a significant concern in the era of AI. To address this, the OECD has developed a comprehensive framework for digital security that encompasses various aspects such as risk management, national digital security strategies, market-level actions, and technical aspects, including vulnerability treatment. Moreover, the OECD hosts an annual event called the Global Forum on Digital Security, providing an opportunity for global stakeholders to discuss and address key issues related to digital security.

Interestingly, AI itself serves a dual role in digital security. While AI systems have the potential to become vulnerabilities, particularly through data poisoning and the malicious use of generative AI, they can also be utilised as tools for enhancing digital security. This highlights the need for robust security measures and responsible use of AI technologies to prevent malicious attacks while harnessing the potential benefits AI can provide in bolstering digital security efforts.

In addition to addressing risks and emphasising security, the OECD recognises the importance of international cooperation, regulation, and standardisation in the AI domain. The mapping of different standards, frameworks, and regulations can help stakeholders better understand their commonalities and develop practical guidance for the responsible development and deployment of AI technologies.

Intergovernmental organisations, such as the OECD, play a vital role in convening stakeholders and facilitating conversations on respective issues. By bringing together governments, industry experts, and other relevant actors, intergovernmental organisations enable collaboration and foster partnerships for addressing the challenges and opportunities presented by AI technologies.

Finally, the development of metrics and measurements is crucial for effectively addressing and evaluating the impact of AI technologies. The OECD is actively involved in the development of such metrics, with one notable example being the AI Incidents Monitor. This initiative aims to capture and analyse real-time data and incidents caused by AI systems, allowing for a better understanding of the challenges and risks associated with AI technologies.

In conclusion, the OECD has made significant contributions to the development and governance of AI technologies. Through the establishment of principles for trustworthy AI, the emphasis on risk management, the focus on digital security, the recognition of AI’s dual role in security, and the efforts towards international cooperation and metric development, the OECD is actively working towards ensuring the responsible and beneficial use of AI technologies on a global scale.

Asaf Wiener

The Israel Internet Association, represented by Asaf Wiener, serves as the country code top-level domain (CCTLD) manager for the IL, which stands for the Israel National TLD. As the manager of this important domain, the association plays a crucial role in overseeing internet activities in Israel.

Furthermore, the Israel Internet Association is the Israeli chapter of the Internet Society, demonstrating their commitment to promoting various aspects of the digital landscape. Specifically, they focus on digital inclusion, education, and cybersecurity within the country. These areas are of critical importance in today’s interconnected world, and the association strives to bridge the digital divide, ensure access to quality education, and enhance cybersecurity measures for Israeli citizens.

Dr. Asaf Wiener’s organization also works towards addressing digital gaps and advancing public initiatives. This highlights their dedication to narrowing the disparities in access and opportunities that exist in the digital realm. By engaging in various public initiatives, they aim to create a more equitable digital landscape for all.

Additionally, Dr. Asaf Wiener demonstrates a strong inclination towards public engagement and participation. He actively invites anyone interested in learning more about their activities to approach him for further details, indicating a desire to foster collaboration and partnerships in pursuit of their mission.

In conclusion, the Israel Internet Association, led by Asaf Wiener, fulfills the crucial role of CCTLD manager for the IL, representing the Israeli chapter of the Internet Society. Their focus on digital inclusion, education, and cybersecurity, and their commitment to addressing digital gaps and engaging the public, highlight their dedication to advancing the digital landscape in Israel.

Abraham Zarouk

Abraham Zarouk is the Senior Vice President of Technology at the Israel National Cyber Directorate (INCD). In this role, he oversees the day-to-day operations of the Technology division, focusing on project implementation, IT operations, and support for national defense activities. Zarouk also plays a key role in preparing the INCD for the future by promoting innovation and establishing national labs for research and development.

The INCD places a strong emphasis on addressing weaknesses in artificial intelligence (AI). They examine vulnerabilities in AI algorithms, infrastructure, and data sets, and have established a dedicated national lab to enhance AI resilience. Through collaborations with industry leaders like Google, the INCD is actively promoting the use of AI-powered technologies and driving innovation in the field of cybersecurity.

In addition to their proactive approach, the INCD also acknowledges the potential threats posed by AI-based attackers. As the use of AI tools among attackers increases, the INCD recognizes the need to stay vigilant and develop strategies to counter these sophisticated attacks.

Overall, Abraham Zarouk’s role as the Senior Vice President of Technology at the INCD is crucial in ensuring smooth operations and driving the organization’s preparedness for future challenges. The INCD’s focus on addressing AI weaknesses, collaboration with industry partners, and recognition of potential AI-based threats highlights their commitment to cybersecurity excellence.

Daniel Loevenich

Germany is taking proactive measures to manage the risks associated with artificial intelligence (AI) within complex technical systems. The country is specifically focusing on the AI components or modules within these systems. This approach highlights Germany’s commitment to addressing the potential dangers and challenges that AI can present.

To further mitigate these risks, Germany is working on extending its existing cybersecurity conformity assessment infrastructure. This move aims to establish a robust framework to evaluate and ensure the conformity of AI technologies. The country is also striving to unify AI evaluation and conformity assessment according to the standards set by the EU’s AI Act. This step demonstrates Germany’s dedication to aligning its evaluation processes with international norms and regulations.

The implementation of the AI Act is deemed crucial for managing AI risks in Germany. This legislation, which the country is actively working towards, will play a vital role in addressing technical system risks across the entire supply chain of AI applications. By incorporating this act, Germany seeks to establish a comprehensive and effective framework for managing AI-related risks.

Furthermore, Germany is actively promoting the adoption of AI technologies, particularly among small and medium-sized enterprises (SMEs). The country recognizes the potential benefits that these technologies can bring and encourages businesses to embrace them. This approach highlights Germany’s openness to innovation and its efforts to support the growth of AI within its industries.

There is also support for international standardization in guiding the use of AI technologies. This standpoint suggests that by establishing global standards, individuals can have more control over how AI technologies are utilized. This commitment to international cooperation reinforces Germany’s desire to foster responsible and ethical AI practices.

It is important to acknowledge that AI technologies are heavily reliant on data, and their responsible usage ultimately rests on individuals. Germany recognizes the responsibility that comes with the use of AI systems and the need for individuals to exercise caution and ethics when handling data-driven technologies.

Another noteworthy observation is the call for the market to be the determining factor in deciding the use of AI-based systems. Germany suggests that market forces and customer preferences should dictate the direction of AI technology, promoting a more customer-centric approach to AI adoption.

Nevertheless, standardizing AI usage at a value-based level can be challenging due to the differences in societal values. The discrepancy in value-based governmental positions creates a complex landscape for consensus-building and establishing universal standards for AI application. Germany recognizes this challenge and the need for careful consideration of normative and ethical issues surrounding the use of AI technologies.

In conclusion, Germany is actively implementing AI risk management within complex technical systems, with a particular focus on AI components. The country is working towards unifying evaluation processes and conforming to international standards through the AI Act. Germany also promotes the adoption of AI technologies among SMEs and supports international collaboration in establishing standards for responsible AI usage. However, the challenge of aligning value-based norms and standards remains an ongoing concern for AI implementation.

Hiroshi Honjo

Hiroshi Honjo is the Chief Information Security Officer for NTT Data, a Japanese-based IT company with a global workforce of 230,000 employees. NTT Data is actively involved in numerous AI and generative AI projects for their clients. Honjo believes that AI governance guidelines are crucial for the company, covering important aspects like privacy, ethics, and technology. These guidelines promote responsible and ethical practices in AI development and usage.

In the realm of generative AI, Honjo highlights the significance of addressing cybersecurity intricacies, particularly in light of recent attacks on large language models. This underscores the importance of tackling cybersecurity issues within the context of generative AI.

One complex issue in handling data by generative AIs is determining the applicable law or regulation for cross-border data transfers. Similar to challenges faced by private companies managing multinational projects, NTT Data must navigate various regulations and ensure compliance with jurisdiction-specific requirements.

Honjo advocates for international harmonization of AI regulations, emphasizing that guidelines in G7 countries are insufficient. He supports the establishment of international standards that govern the development, use, and deployment of AI, aimed at promoting fairness and consistency in AI regulation.

Additionally, Honjo expresses his concern regarding uneven data protection regulations like the General Data Protection Regulation (GDPR). He acknowledges that differing data protection regulations across countries impose significant costs on businesses. To mitigate these challenges and ensure a level playing field for businesses operating in multiple jurisdictions, Honjo advocates for consistent and harmonized data protection measures.

In summary, Hiroshi Honjo, as the Chief Information Security Officer for NTT Data, emphasizes the necessity of AI governance guidelines, the need to address cybersecurity intricacies in generative AI, the complexity of cross-border data transfers, and the importance of international harmonization of AI regulations. His commitment to consistent data protection regulations reveals his dedication to reducing costs and promoting fairness within the industry.

Bushra Al-Blushi

Bushra Al-Ghoushi is an influential figure in the field of cybersecurity and currently serves as the Head of Research and Innovation at Dubai Electronic Security Center. She has made significant contributions to the industry through her leadership positions.

One of Al-Ghoushi’s notable achievements is the establishment of Dubai Cyber Innovation Park, which aims to promote innovation and collaboration in the field of cybersecurity. Her involvement in founding this park demonstrates her commitment to advancing the industry and creating opportunities for technological development.

Al-Ghoushi’s expertise is also recognized internationally, as she is an official UAE member of the World Economic Forum Global Future Council on Cyber Security. This highlights her contributions to global discussions and initiatives surrounding cybersecurity.

Furthermore, Al-Ghoushi’s extensive involvement in advisory boards, both nationally and internationally, reflects her broad knowledge and the trust placed in her expertise. These advisory roles enable her to shape policies and strategies in the field, further solidifying her thought leadership and influence.

In terms of AI risks, Al-Ghoushi advocates for a gradual and incremental approach to cybersecurity rules and regulations. She emphasizes the importance of identifying and mitigating potential risks posed by AI through appropriate controls and regulations.

Al-Ghoushi also highlights the significance of considering the deployment of AI models and how they impact security controls. She emphasizes the need for addressing the unique risks associated with AI in their development and implementation, ensuring that adequate security measures are in place.

Regarding policy and regulatory approaches, Al-Ghoushi supports a risk-based approach that strikes a balance between control and security issues. She collaborated with Dubai in 2018 to develop AI security ethics and guidelines, which remain applicable to generative AI today.

Al-Ghoushi emphasizes the need for global harmonization of AI regulations and standards. Currently, different countries have fragmented regulations, making compliance challenging for providers and consumers. Harmonization would simplify compliance and instill confidence in internationally recognized AI tools.

To achieve this, Al-Ghoushi suggests international collaboration and the establishment of an international certification or conformity assessment for AI. This would ensure that AI systems meet minimum security requirements and facilitate compliance for providers while enabling effective enforcement of industry standards by regulatory bodies.

In conclusion, Bushra Al-Ghoushi’s leadership and expertise in cybersecurity are evident through her various roles and initiatives. Her emphasis on gradual, incremental cybersecurity rules and regulations for AI reflects a balanced approach that prioritizes both innovation and security. Al-Ghoushi’s advocacy for global harmonization of AI regulations and the establishment of international certification schemes further underscores her commitment to promoting secure and responsible use of AI technologies.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Creating digital public infrastructure that empowers people | IGF 2023 Open Forum #168

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Irina Soeffky

The Indian G20 presidency deserves commendation for its focus on digital public infrastructure, emphasizing the importance of integrating technology into public infrastructure. Germany is also actively contributing to the development of digital public services through projects such as EID (Electronic Identification) and the EU-wide ID, aiming to enhance digitization across various sectors.

Irina Soeffky, a supporter of international cooperation for digitalization, recognizes the need for collaboration in this field. The Federal Ministry of Economic Cooperation and Development, in collaboration with GIZ (the German Corporation for International Cooperation), is actively providing open and interoperable elements to countries. Their goal is to assist countries in building their public infrastructure and fostering cooperation in digitalization, highlighting the importance of international partnerships.

The Gafstag Initiative, a noteworthy project, promotes interoperability and openness in public infrastructure. It is remarkable for creating public infrastructure that is not only interoperable but also reusable, enabling new business possibilities and fostering innovation in digital public services.

In conclusion, the Indian G20 presidency’s focus on digital public infrastructure and Germany’s contributions through projects like EID and EU-wide ID emphasize the significance of digitization in various sectors. The support of Irina Soeffky for international cooperation in digitalization and the Gafstag Initiative’s efforts to promote interoperability and openness further reinforce the importance of collaboration and innovation in building digital public infrastructure. These initiatives collectively contribute to the advancement of technology and digitalization globally.

Audience

The analysis of the implementation of digital public goods (DPG) and digital identity systems highlights the need for a coordinated and inclusive approach. It stresses the importance of instilling the DPI mindset in policymakers and leaders, especially in terms of championing successful implementations like Amado. The analysis also points out coordination problems within governments, such as turf wars and a lack of unified effort, which hinder the implementation of DPG and digital identity systems.

To overcome these challenges, the analysis suggests starting with a use case and building upon it in a way that allows others to easily plug into the system. Emphasizing minimalism can also contribute to a more effective approach.

Learning from both successful and unsuccessful implementations is crucial. The Indian experience is particularly highlighted, where a digital identity project was implemented without a legal framework that adequately protected data rights. The reliance on a centralized, cloud-stored biometric database proved to be problematic. By examining this case, valuable lessons can be learned to avoid similar mistakes in the future.

The analysis also addresses the issue of digital identity misuse and exclusion. Insights from experiences in India, Kenya, and the Philippines can inform the efforts of communities like the Digital Public Goods Alliance (DPGA) in mitigating these issues. It recommends involving human rights groups in the consultative process to ensure a more comprehensive and inclusive approach.

Furthermore, the analysis draws attention to the high failure rate of identity systems in India and its impact on public welfare delivery. Low levels of digital literacy play a significant role in these failures. A bottom-up approach for the redressal mechanism of digital identity systems is proposed to address these challenges.

Additionally, the necessity of user choice in dealing with system failures is highlighted. Allowing users the option to switch to human assistance when there is a digital verification failure can especially benefit regions with low levels of digital literacy. This user-centric approach ensures that individuals with limited digital skills are not excluded from the benefits of digital public goods and services.

Overall, the analysis emphasises the need for a coordinated and inclusive approach in implementing digital public goods and digital identity systems. It highlights the importance of the DPI mindset, learning from past experiences, mitigating harm and exclusion, involving human rights groups, adopting a bottom-up approach, and providing user choice. Following these principles will help achieve effective and secure digital public goods and identity systems.

Adriana Groh

The concept of Digital Public Infrastructure (DPI) extends beyond immediate innovations and necessitates a focus on the robust and ongoing maintenance of software components. It is concerning that 64% of the 133 most widely used software components are in critical shape and are only maintained by a few individuals. These software components are not only critical but also vulnerable, posing a significant risk if they were to break, as they are extensively used in our day-to-day lives.

Adriana, a strong advocate for a holistic approach to DPI, emphasises the importance of securing and maintaining these underlying software components, which often go unnoticed. She underscores the need for open digital-based technologies and the dependence on open-source software that operates in the background and is continuously maintained and available to support the functioning of various systems.

Interoperability and adaptability of public software and digital technology are also vital aspects that Adriana highlights. She suggests that sharing and learning together will help achieve this goal and points out the need for interoperable software and digital technologies. Additionally, she mentions the concept of ‘public money, public code’, asserting that software financed by taxpayers’ money should be open and adaptable.

Adriana further argues that redundancy in digital base technologies is indispensable to prevent single points of failure. She explains that having similar tools running concurrently ensures that if one fails, alternative routes can be taken to ensure uninterrupted functionality. She employs the analogy of a road, emphasising the significance of having multiple routes to reach a destination.

Moreover, Adriana emphasises the necessity of international cooperation in addressing global digital challenges. She highlights the potential risks of the ecosystem being torn apart without international cooperation and underscores the need for well-coordinated efforts. She draws attention to the “tragedy of the commons” in the context of the digital public commons, where everyone relies on it but no one feels responsible. This further underscores the importance of international cooperation and shared responsibility.

In conclusion, the concept of Digital Public Infrastructure encompasses the maintenance of software components beyond immediate innovations. Adriana advocates for a holistic approach, with an emphasis on securing and maintaining underlying software components, promoting open digital-based technologies, interoperable and adaptable public software, and redundancy in digital base technologies. International cooperation is crucial in tackling global digital challenges and ensuring well-coordinated efforts in the digital public commons.

Valeriya Ionan

The speakers provide valuable insights into the digital transformation in Ukraine, emphasizing the importance of creating a conducive environment that allows all participants to work efficiently within the digital ecosystem. The success of the DIA app in Ukraine is highlighted, with its impressive user base of over 19.5 million users. The app is not limited to digital documents and online government services; it also focuses on streamlining workflows in both the public and private sectors.

Furthermore, the government of Ukraine is commended for its effective collaboration with startups, private companies, and civil society. This demonstrates the need for governments to adopt an agile and flexible approach, operating more like IT companies. The speakers advocate for the implementation of Chief Digital Transformation Officer (CDTO) positions within governments to expedite the digital reform process across various levels and spheres.

The importance of public-private partnerships is emphasized as an effective means to enhance digital infrastructure and literacy. The creation of the DIA Education platform in collaboration with the private sector and civil society serves as an example of how such partnerships can contribute to improving digital literacy. The platform focuses on equipping individuals with the necessary digital skills and knowledge.

The speakers also highlight the value of learning from successful digital transformations in other countries. Ukraine draws inspiration from Estonia’s digital transformation and actively incorporates their GovTech products and experiences. This approach encourages governments to leverage existing successful solutions rather than investing time in seeking new ones.

Effective communication and collaboration between the government, civil society, and the private sector are seen as crucial for the progress of digital transformation. The establishment of platforms that facilitate the exchange of digital products and experiences is recommended. This allows for the sharing of best practices, knowledge, and experience across regions.

Additionally, the speakers stress the importance of world-class education programs catering to digital leaders. They argue that such programs should not only provide knowledge and expertise but also offer networking opportunities. Currently, there is a lack of academic or non-academic programs specifically tailored to preparing individuals for Chief Digital Transformation Officer roles within governments.

The speakers emphasize the need to view digital transformation as a comprehensive system rather than isolated initiatives. This holistic perspective ensures that all aspects, including user-centric and human-centric services, are considered. Building a digital country is not just about technological advancements but also about inclusivity and improving the basic level of digital literacy.

This analysis provides valuable insights into the digital transformation efforts in Ukraine, highlighting the successes achieved through the DIA app, effective collaboration between the government and other stakeholders, the importance of public-private partnerships, and learning from other countries’ experiences. The introduction of CDTO positions and the need for communication platforms and world-class education programs are also emphasized. Overall, the speakers’ arguments shed light on the essential factors and strategies required for successful digital transformation in Ukraine.

Mark Irura

The analysis highlights several important points regarding the development and maintenance of digital services and infrastructure.

One key point is the need for a community approach. This involves developers putting in their intellect and energy to build these services and maintain them over the long term. Open source development is seen as crucial in enabling the developer community to contribute to long-term development. The argument is that there is no community in between the demand and supply to be able to innovate around packages of reusable, interoperable components.

On the topic of governance, it is emphasized that the government is responsible for maintaining the vision and foresight of the digital platform in the long term. The regulation aspect or the vision or the foresight cannot be delegated by the government or funders. This illustrates how governance plays a vital role in implementing digital public infrastructure, with proper procedures required to address issues that cannot be solved by technology alone.

Long-term planning and examination are necessary for the successful implementation of digital public infrastructure. The pressure to show immediate results can hinder the progress of digital projects. It is more beneficial to think in longer terms and allow time for the development and improvement of these digital infrastructures. Data sharing across agencies also requires a long-term viewpoint to understand its implications. This highlights the need for long-term planning and examination for the implementation of digital public infrastructure.

Another important aspect is the development of skills to support the procurement of digital public goods. The government should develop skills to handle the procurement of these goods, which can help lower their total cost of ownership. Additionally, funding instruments should be designed to sustain long-term projects that, although may not show immediate results, will benefit in the longer run. For example, the construction of the foundation of a house might take a lot of resources and not show immediate results, but it is crucial for the overall structure. This argues for the development of funding instruments that reflect long-term objectives.

Increasing trust between citizens and their governments regarding digital IDs in Africa is crucial. Public participation in designing these solutions is often treated as an academic exercise, leading to a low level of trust due to a connection deficiency between data and service delivery. Regulations are needed to help citizens push back and use the instruments of the law. Trust is also hampered by the politics of how everything is done. This reveals the importance of increasing trust between citizens and their governments when it comes to digital IDs in Africa.

Citizen involvement in the defining or designing solutions can drive or stop court cases implementing the system. Testing the laws and involving citizens in the process can increase trust. Policies should take account of individual rights as data rights. This highlights the need for citizen involvement in the development and implementation of digital infrastructure.

Consideration of the ‘total cost of ownership’ is critical during procurement. Shared experiences reveal challenges in terms of costs for SMS systems and infrastructure development when handing over systems to the government. It is important for the government to try out systems before making purchase decisions to avoid being locked in and facing issues later. This emphasizes the importance of considering the long-term implications of licensing at the database, middleware, or application level during government purchases.

In terms of security and data protection, the analysis advocates for preventative and curative measures for digital public good security. The Digital Public Goods Alliance is developing good practice principles, and adapting these principles can preempt issues. This supports the need for measures to ensure the security of digital public goods.

In conclusion, the analysis emphasizes the importance of a community approach, governance, long-term planning, skill development, funding instruments, trust-building, citizen involvement, and security measures in the development and maintenance of digital services and infrastructure. These insights shed light on the challenges and considerations that need to be taken into account for the successful implementation of digital services and infrastructure.

Pramod Varma

India’s approach to Digital Public Infrastructure (DPI) emphasizes the importance of civil society and citizen engagement to improve privacy and inclusion elements in DPI building. The use of civil society or citizen engagement as a supply-side tool is considered common and essential in this process. Creating one solution infrastructure and building several solutions on top of it is key for India due to its diversity and scale.

Marketplaces, NGOs, and other non-governmental organizations (NGOs) play a crucial role in the DPI ecosystem. Marketplaces are important for creating sustainability and agile innovation, while NGOs are key in addressing diverse needs, especially for vulnerable sections of society. The DPI also reduces the cost of solutioning for NGOs, making it feasible for them to develop solutions for specific sections.

A minimalistic approach is emphasized in building DPIs in India. The identity project, payment project, and credential sharing in India were built with this minimalistic principle. This approach aims to streamline processes and ensure efficiency in delivering digital public services.

Participatory governance, accountability, and dispute grievance resolution are crucial in implementing digital infrastructures. Governance plays a vital role in the effective implementation of DPI.

Resilience and redundancy are necessary aspects of digital infrastructures. India has implemented three or four payment systems for this purpose, ensuring resilience and redundancy.

Societal, political, and regulatory buy-in is necessary for the successful implementation of digital public infrastructure. Given that these DPIs impact a billion people in India, significant support and coordination from society, political leadership, and regulatory bodies are essential.

Global coordination is critical for interoperability. As people seek opportunities for work, education, and healthcare across countries, global coordination is important for seamless cross-border operations.

Support for sharing digital assets as open source goods accelerates digital innovation. The availability of Digital Public Goods (DPGs) and open-source goods contributes to rapid development and adoption of digital technologies.

A common definition and understanding of DPI have been created among many countries through G20 coordination and discussions. This has led to the development of a shared vocabulary and a common set of principles that underpin DPI.

The context of each country is unique, necessitating country-specific DPI residents. Many countries are working to create their own DPI residents to cater to their specific needs and challenges.

Efforts to share assets via the Digital Public Goods (DPG) ecosystem are supported by DPI funds. These initiatives aim to facilitate the development and sharing of digital assets, fostering collaboration and innovation.

The establishment of identity systems varies for each country, revolving around their specific context. Starting now, countries are advised to have full legal support, especially for identity systems.

Data storage in identity systems should be minimalist and secure. The identity system in India, for example, has not been breached so far, highlighting the importance of secure storage practices.

The analysis emphasizes the significance of participatory governance, the need for resilience and redundancy in digital infrastructures, and the importance of societal, political, and regulatory buy-in. It also highlights the critical role of global coordination, support for open-source sharing, and the country-specific nature of DPI implementations. These findings provide valuable insights into India’s approach to DPI.

Aishwarya Salvi

Digital Public Infrastructure (DPI) has the potential to transform governments, economies, and societies worldwide. The rapid advancement of digital technologies has significantly changed how we interact and conduct business on a global scale. Governments are now adopting various approaches to implement DPI, recognizing its crucial role in facilitating participation in society and markets.

The successful implementation of DPI requires striking a delicate balance between the diverse needs and interests of different stakeholders. This complex task involves carefully considering the expectations and demands of governmental bodies, businesses, civil society, and the general public. By effectively managing these varying perspectives, DPI can be tailored to meet the specific requirements of each stakeholder group, ensuring inclusivity, interoperability, and accountability.

International cooperation plays a vital role in fostering the creation of inclusive, interoperable, and accountable DPI. Collaboration on a global scale allows governments, policymakers, regulators, businesses, and civil society organizations to leverage shared knowledge and resources in developing DPI solutions that empower individuals and enable seamless interactions across borders. The German Federal Ministry of Digital and Transport, in conjunction with GIZ, has organized digital dialogues as a platform for direct exchange and discussions on the importance of international cooperation in developing effective DPI solutions.

These digital dialogues enable policymakers, regulators, businesses, and civil society representatives to engage in meaningful conversations, sharing lessons, ideas, and perspectives on approaches to implementing DPI. Through this collaborative effort, best practices and innovative strategies are identified, guiding countries in establishing robust DPI frameworks.

In conclusion, DPI has the potential to revolutionize governments, economies, and societies worldwide. Its successful implementation rests on finding a delicate balance between the diverse needs and interests of stakeholders. Moreover, international cooperation is crucial for fostering the creation of inclusive, interoperable, and accountable DPI. The digital dialogues organized by the German Federal Ministry of Digital and Transport in partnership with GIZ provide a valuable platform for policymakers, regulators, businesses, and civil society to exchange ideas and insights, contributing to the development of effective DPI solutions.

Moderator

The analysis focuses on the challenges faced during the digitisation process of India’s digital identity project. One of the major issues identified is the absence of a proper legal framework to govern the project. This lack of legal guidelines created uncertainties and posed challenges in implementing and regulating the digital identity system effectively.

Another significant concern is the inadequate consideration given to data protection rights. The digitisation process failed to account for the rights of individuals in relation to their personal information. This omission raises important questions regarding privacy and data security in the digital identity system.

Furthermore, the design of the system, which relied on a centralised cloud-based and cloud-stored biometric database, is notable. While this approach may have certain advantages in terms of convenience and accessibility, it also raises concerns about the security and potential misuse of personal data stored in the cloud. These issues highlight the need for a more thorough and thoughtful approach to the design and implementation of such systems.

In light of these challenges, the analysis suggests that the global community can learn from the mistakes made in India’s digital identity project. By examining these shortcomings and addressing them proactively, other countries and organisations can avoid similar pitfalls and create more robust and secure digital identity systems.

Additionally, the analysis highlights concerns about the misuse and exclusion of digital identity in infrastructure rights and governance. It argues that steps need to be taken to mitigate the potential harms associated with such misuse and to ensure that the benefits of digital identity are shared inclusively among all individuals and groups. To achieve this, the analysis recommends consulting with human rights groups and other stakeholders, as they can bring valuable insights and perspectives to the decision-making process. By including them in the consultative process, the aim is to mitigate risks and harms and ensure that the design and implementation of digital identity systems align with human rights principles.

In conclusion, the analysis underscores the importance of addressing the challenges faced in the digitisation of identity systems by considering legal frameworks, data protection rights, and the design of the systems themselves. Learning from the Indian experience and the mistakes made can benefit the global community in developing secure and inclusive digital identity solutions. Furthermore, the involvement of human rights groups and other stakeholders in the decision-making process is crucial for mitigating risks and ensuring that human rights are upheld in the digital age.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more