The Internet in 20 Years Time: Avoiding Fragmentation | IGF 2023 WS #109

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Henri Verdier

Henri Verdier, a pioneering internet entrepreneur, took a leap of faith in 1995 by starting his first internet company during a time when there were only 15,000 web surfers in France. Initially, Verdier harboured doubts about the potential of crowd-sourced knowledge bases like Wikipedia. However, he has since come to embrace the transformative power of the internet.

One of Verdier’s concerns is the fragmentation and privatization of the internet. It is disconcerting to see certain big states and tech companies disregarding the importance of a free, open, and decentralized internet. This issue raises questions about the future of an internet that is accessible and available to all.

Cyberspace has become intertwined with various aspects of life, including education, health, business, and even matters of war and peace. This highlights the enormity of the impact of the digital revolution in recent times. Furthermore, there has been a rise in digital diplomats as part of this revolution.

Understanding the distinction between technical fragmentation and legal fragmentation of the internet is crucial. Technical fragmentation leads to a higher temptation to disconnect from each other, while the legal aspect of internet governance empowers individuals to shape their own future.

In advocating for a free, open, and decentralized internet, Verdier acknowledges the importance of respecting each country’s right to establish its own legal framework. He believes in the right of the people to make decisions about their own future and is a strong proponent of an open and neutral internet. He opposes the idea of a unified market for tech giants such as Mr. Zuckerberg.

Another vital aspect is the need for network standards and legal standards to be interoperable. This ensures seamless connectivity and compatibility between different systems.

Verdier highlights the distinction between private online spaces, such as social networks, and the internet itself. He sees entering a social network as akin to leaving the internet, emphasising that social networks are “private places” built on top of the internet’s infrastructure. Additionally, Verdier expresses a preference for European rules over private rules from platforms like Elon Musk’s.

The golden age of the internet has ushered in an unprecedented openness of access to information, knowledge, and culture. This has been a monumental shift, allowing people from various backgrounds to engage with a vast array of resources. Furthermore, this period has uniquely empowered communities and individuals, enabling them to have a greater say in shaping their own futures. The permissionless innovation that characterizes this era has also spurred remarkable progress.

Verdier cautions that threats to individuals’ autonomy, empowerment, and creativity can stem from many sources, not solely rogue states. He has expressed concerns about the role of the private sector in potentially impeding these freedoms.

In conclusion, Henri Verdier, a respected internet entrepreneur, has witnessed and experienced the incredible evolution of the internet. While initially doubtful, he now recognises its transformative potential. However, he remains watchful of the dangers of fragmentation, privatization, and the potential threats to people’s autonomy and creativity. By advocating for a free, open, and decentralized internet, he strives to strike a balance between global connectivity and respecting the sovereignty of individual nations. Overall, his insights and observations shed light on the complex challenges and opportunities presented by the internet in the modern world.

Izumi Aizu

Predicting the future is a challenging task, especially when it comes to disasters and conflicts. These events are often unpredictable in nature, as exemplified by the earthquake and tsunami that occurred 12 years ago, which was not foreseen. Recent conflicts in Gaza and Ukraine were also unexpected. Despite advancements in technology, such as the Internet, smartphones, and AI, natural calamities and conflicts continue to impact the world unexpectedly. This suggests that while optimism about the future is important due to technological advancements, reality often brings unexpected events.

The future is multi-faceted, consisting of both positive and negative aspects. It is composed of different elements, including both dark and bright aspects. While there may be positive advancements, there are also dark and challenging aspects to consider. It is important to have a holistic understanding of the future, considering its multi-dimensional nature.

One perspective on the future of the Internet is presented by Izumi Aizu. He believes that the future scenarios of the Internet will be characterised by mixed networks co-existing with the traditional Internet, fragmented Internet with national bloc politics, and a globally unified strength Internet. This suggests that the future of the Internet may be chaotic and fragmented.

However, Aizu also believes in the Internet as a tool for global communication and knowledge sharing. Despite the potential fragmentation due to political and economic reasons, he emphasizes that the underlying ethos of the Internet as a communication tool is likely to persist. Aizu challenges the view that achieving a ‘better internet’ alone should be the ultimate goal. Instead, he emphasizes the importance of focusing on creating better societies and better people.

Aizu agrees with Sheetal Kumar’s statements about the need to harmonize legal frameworks to international human rights standards and make governance bodies more inclusive, particularly in the context of internet governance. He suggests that the future of technology, including the Internet, should be informed by current politics and environmental changes. This includes considering potential regulations on servers, data centers, and artificial intelligence (AI) due to environmental factors.

Furthermore, Aizu emphasizes that the focus should not solely be on the future of the Internet but on the future of humanity as a whole. He argues that it is essential to address global goals like good health and well-being, quality education, and sustainable cities and communities alongside technological advancements.

The current discourse on artificial intelligence (AI) is criticized for its lack of inclusivity. Aizu points out that important countries like China and India were not adequately represented in the discussion. This highlights the need for broader participation and diverse perspectives in shaping the future of AI.

The present state of the Internet Governance Forum (IGF) is perceived as peaceful but unremarkable. Although the IGF has evolved from being tense and fearful in the past, it is now considered to be less impactful and engaging.

In conclusion, predicting the future is a challenging task, particularly regarding disasters and conflicts. Advancements in technology do not eliminate the unpredictability of these events. The future is multi-faceted, composed of both positive and negative aspects. The future of the Internet may be chaotic, but it also holds potential as a tool for global communication and knowledge sharing. The focus should be on creating better societies and better people, rather than solely improving the Internet. Harmonizing legal frameworks and governance bodies to international human rights standards is crucial for responsible internet governance. Considering current politics and environmental changes is important when shaping future technology. Inclusivity is key when discussing topics like AI, and broader participation is needed. The present state of the IGF is perceived as peaceful but unremarkable, highlighting the need for more impact and engagement. It is essential for IP fundamentalists to expand their perspectives and engage with other global issues. By doing so, they can learn from and contribute to discussions on topics like climate change.

Olaf Kolkman

Predicting the future of the internet is a challenging task due to the complexities and rapid advancements in technology. However, there are differing viewpoints on what the future may hold.

One perspective is that openness is a key feature that should define the future of the internet. This notion is supported by the belief that the scientific method of sharing knowledge, criticizing each other, and making knowledge readily available has been instrumental in driving innovation and progress. Openness allows for collaboration and the exchange of ideas, thereby fostering continuous development and improvement. Furthermore, empowering communities through bottom-up methods, such as building Internet Exchange Points (IXPs) and providing cookbooks for community networks, helps ensure that everyone has equal access to the benefits of the internet.

However, there is another argument that proposes a future scenario where the internet becomes closed and proprietary. This model envisions a world where services are primarily developed to generate profits, prioritising monetary gain over network connectivity. Under this system, the concept of openness may be overshadowed by profit-driven motives, potentially hampering innovation and limiting access for certain groups of people.

Additionally, the lack of infrastructure is identified as a significant challenge that leads to fragmentation. Without adequate infrastructure, internet services may be limited or nonexistent in certain regions, impeding connectivity and hindering progress.

One area of concern is the influence of industry politics on standardisation bodies. It is recognised that choices made by these bodies can be influenced by industry interests and agendas, potentially impacting the open and transparent nature of internet standards.

The notion of consolidation is another topic of discussion. Even with open technologies, companies may seek to extract profits and monopolise the market, leading to consolidation and reducing diversity. This trend raises concerns about fair competition and innovation within the internet ecosystem.

On the other hand, innovation does not always require strict standards. For example, the development of blockchain technology by Satoshi Nakamoto, where an innovative approach was taken without relying on a predefined standard, showcases the possibility of permissionless, open, and individual-driven innovation.

Open architecture, open-source, open standards, and transparency are highlighted as essential components for a positive future of the internet. Open architecture allows people to build upon existing technologies, while open-source encourages collaboration and reuse of building blocks. Open standards and transparency promote inclusivity and foster trust among users.

Internet regulation and governance are acknowledged as crucial aspects for the future of the internet. A principle-based approach that considers factors such as individualism, autonomy, and societal values is suggested as a means of organising the internet. However, achieving global consensus on these matters is expected to be challenging given the diverse perspectives and interests of various stakeholders.

In conclusion, predicting the future of the internet is a complex task, given the rapid pace of technological advancements. While there are differing opinions on what the future may hold, the importance of openness, infrastructure development, community empowerment, and fair governance are recurrent themes in shaping a positive future for the internet.

Lorrayne Porciuncula

The analysis explores different perspectives on the impact and governance of the internet and technology. It begins by highlighting the initial optimism surrounding these tools, with the belief that they would serve as liberating and empowering forces. Lorrayne Porciuncula grew up closely involved in the evolution of the internet through her father’s local ISP in Brazil. She conducted a survey that revealed widespread optimism about the benefits that technology would bring to society. However, it is noted that the reality of technology’s impact is more nuanced than early optimistic predictions.

Porciuncula acknowledges that while the internet and technology have brought some positive changes, they have not fully lived up to the idealistic visions many had held. The argument presented is that the future concern lies more in the legal and regulatory aspect of technology rather than the technical layer. It is stressed that there is a need to consider how to build alignment across different national legal and regulatory frameworks to avoid fragmentation.

Furthermore, it is suggested that coordination and collaboration are essential in creating a more agile perspective towards internet infrastructure. This includes having a multi-stakeholder approach and addressing the challenges of cross-border coordination. Porciuncula emphasizes the importance of finding institutions and processes that are capable of considering various perspectives and adapting to the ever-evolving nature of technology.

The analysis also highlights the complexity of the internet and the need for international cooperation in its governance. It is recognized that the internet is difficult for one government to regulate and comprehensive governance requires collaboration on an international scale. The argument is made that the focus should be on governing the complex adaptive system of the internet through international cooperation.

Narratives are identified as playing a crucial role in discussions about the internet and digital society. Porciuncula emphasizes the importance of addressing issues such as walled gardens with competition tools and identifying the requirements society has for the internet. The analysis also notes that there is a lack of clarity about what society wants from the internet.

The need for remedies that allow users to switch between internet platforms is highlighted, drawing parallels with the example of telecoms where users have the right to switch. This is seen as a means to promote competition and reduce inequalities.

Addressing the complexity of internet governance requires a clear objective, an incremental and iterative approach, and multi-stakeholder inclusion. The analysis stresses the importance of considering the perspectives of underrepresented communities and incorporating them into the decision-making process. It is argued that multi-stakeholderism is not about relinquishing government decision-making power but rather about creating a more inclusive and democratic approach.

Lastly, the analysis suggests that sandboxes can serve as a valuable tool for testing new policies and understanding potential issues. By allowing for real-world testing of regulations, sandboxes can provide insights into the effectiveness of policies and help address any unintended consequences.

In conclusion, the analysis highlights the need for a more nuanced understanding of the impact and governance of the internet and technology. While there was initial optimism about their liberating and empowering potential, it is recognized that their impact is more complex. The focus should shift towards the legal and regulatory aspects and finding alignment across national frameworks to avoid fragmentation. Additionally, a more agile perspective, international cooperation, and multi-stakeholder inclusion are crucial in addressing the challenges of internet governance. Clear objectives, an iterative approach, and multi-stakeholder involvement are necessary to tackle the complexity of the system.

Emily Taylor

In the discussions surrounding the future of the Internet, Emily Taylor raises the need to explore potential risks and scenarios. Taylor outlines three possible scenarios for the Internet’s future: muddling along as it currently is, fragmentation due to various factors, or a more positive collective future created by society.

Taylor also reflects on the optimism once associated with the Internet, expressing a desire to rediscover that sense of potential for liberation and empowerment. This highlights the importance of not losing sight of the positive aspects of the Internet’s evolution.

The discussions emphasize viewing technology as an integral part of society rather than something separate. Izumi’s views on the chaotic nature of the Internet and the need for focus on better societies and individuals support this argument. The concept of a better future should encompass technological advancements as well as advancements in society and individuals.

In conclusion, the future of the Internet requires consideration of potential risks, a renewed sense of optimism, and recognition of the integration between technology and society. This comprehensive analysis offers insights into the discussions surrounding the future of the Internet and the need to align technological advancements with societal progress for a more inclusive and beneficial future.

Note: There were no UK spelling and grammar errors to correct in this text.

Sheetal Kumar

The future of the internet is predicted to become increasingly intertwined with our daily lives and more challenging to separate from our activities, according to multiple speakers. They assert that advancements in technology have resulted in devices becoming smaller and faster, leading to the omnipresence of cameras through mobile phones. This development has made capturing and sharing images an effortless part of our routine.

Furthermore, the speakers emphasize the accuracy of past predictions regarding technological advancements. This observation highlights the potential for future visions and creations to shape the evolution of the internet. It implies that our anticipation and actions today can play a crucial role in determining the trajectory of technological progress.

Sheetal Kumar, one of the speakers, underlines the significance of actively shaping the future of technology. She stresses that technology should feel liberating for all individuals, especially those who lack positions of power. Kumar emphasizes the need to address and overcome current social inequalities in shaping the future of the internet. This call for inclusivity is accompanied by an appeal for engagement and cooperation among technology builders and standard-setters.

Moreover, the speakers stress the importance of harmonizing legal frameworks with human rights standards and making decision-making bodies more inclusive. This notion is grounded in the existence of international human rights law and standards. The speakers argue that aligning legal systems with human rights principles leads to more equitable and just outcomes. They advocate for increased transparency and a reinstated sense of user control in internet data, as recent trends have demonstrated a shift in control from users to corporate actors and governments.

Protecting the openness of the internet is seen as paramount. The speakers highlight the value of open access, enabling people to go online, build new applications, and develop technologies. They argue that maintaining openness fosters innovation, collaboration, and an inclusive digital environment.

In conclusion, the future of the internet is expected to be tightly integrated into our lives, making it difficult to disassociate from our activities. Promoting a future where technology feels liberating and inclusive is a shared goal among the speakers. They advocate for engagement, cooperation, and the alignment of legal frameworks with human rights standards. Reinstating user control and transparency while protecting the openness of the internet is also considered essential. Ultimately, the future world should be built upon the principles of liberation and the safeguarding of human rights.

Raul Echeverria

During the discussion, the speakers covered various important topics, including the challenge of internet fragmentation and its negative impact. They acknowledged the already existing fragmentation in the internet and expressed the mission to minimize it as much as possible, promoting a more unified and accessible internet for everyone.

Another significant aspect discussed was the need for gradual objectives and commitments in policy making. The speakers emphasized the importance of starting with simple agreements and progressively improving upon them. This approach encourages collaboration and partnerships among different stakeholders, in line with the goal of achieving the Sustainable Development Goal (SDG) 17 of “Partnerships for the Goals.”

To improve messaging and policymaking, the speakers emphasized the importance of clear and concise messages regarding internet fragmentation and its implications. Simplifying these messages would enhance policymakers’ understanding and enable them to make informed decisions. This approach aligns with SDG 16, which aims for “Peace, Justice, and Strong Institutions” and underscores the need for effective communication in policy-making processes.

Additionally, the discussion shed light on the impact of fear on shaping future policies, particularly in relation to artificial intelligence (AI). The speakers observed that discussions at a global conference primarily focused on fears and concerns about AI, with a negative bias. They argued against formulating policies solely based on fear, advocating for a balanced and rational approach rooted in evidence-based decision-making.

The speakers also emphasized the importance of involving youth in policy discussions. They believed that regardless of their level of expertise, young individuals should have a voice in shaping the future. This recognition aligns with SDG 16 and highlights the value of diverse perspectives in the policy-making process.

In summary, the speakers stressed the need for collaboration, clear messaging, and gradual improvement in policy-making processes, while cautioning against the negative influence of fear. By involving various stakeholders, particularly youth, in discussions, they aimed for a comprehensive and inclusive approach to envision and shape the future of the internet.

Audience

The future of the internet is heavily influenced by innovation in use cases and applications. Younger engineers are seen as key drivers of this innovation, as they come up with new ideas that shape the development of internet protocols and technology. However, there are concerns about the current state of the internet. It has shifted from being a force for good to being driven by aspects such as surveillance, capitalism, malware, and misinformation. This observation highlights the need for measures to address these negative aspects and ensure that the internet continues to serve as a positive force in society.

Diversity and inclusion also emerge as crucial factors in the development of internet standards. The lack of female participation and end-user representation in standards bodies is seen as a problem that needs to be addressed. Having more diversity and inclusivity in these bodies allows for a wider range of perspectives, leading to more comprehensive and effective standards.

Predicting future advancements in technology should focus on understanding user demands rather than solely relying on technological capabilities and government regulations. The speaker suggests that the best way to anticipate future developments is by understanding what individual users want technology to do. This user-centric approach ensures that technological advancements align with the needs and desires of the people.

While there is technological optimism, challenges arise from governmental regulation fragmentation and enforcement contradictions. The existence of contradictory laws and regulations related to privacy and online content does not seem to inhibit governments from enforcing them, raising concerns about the effectiveness and coherence of regulation in the internet landscape.

Incentives, particularly money, play a significant role in driving internet development, especially in the context of web 3 crypto. However, it is acknowledged that money may not be the sole incentive driving technology development. Other factors such as societal impact, innovation, and user satisfaction should also be considered.

The influx of cryptocurrencies is expected to make the future of the internet more complex and fragmented. This observation raises concerns about the possibility of increased fragmentation and the need for regulation to address these complexities effectively. Government regulation fragmentation is seen as a major risk that could hinder the development of a cohesive and secure internet.

There is also a focus on the need for more inclusive regulation, particularly in the context of AI. The lack of consensus and the competition surrounding AI regulation are seen as challenges. It is suggested that businesses, civil societies, and the engineering sector should document the consequences of fragmented regulation to increase awareness and promote more balanced and inclusive approaches.

Inclusivity and engagement of users from the global south and countries with geopolitical differences are highlighted as essential for the future of the internet. By incorporating diverse perspectives, the development and governance of the internet can be more representative and inclusive.

There are concerns about the negative aspects of the internet, such as internet shutdowns and the exploitation of ICT by bad actors. These issues call for regulation and measures to ensure the proper and ethical use of technology.

The importance of aligning government regulations with human rights norms and standards is emphasized. Both governments and companies have responsibilities to uphold human rights through their actions and policies.

Inclusive governance and the involvement of diverse stakeholders, particularly users, are seen as crucial. By including different voices and perspectives, decisions about the internet’s future can be more comprehensive and representative.

In conclusion, the future of the internet is shaped by innovation in use cases and applications driven by younger engineers. However, challenges exist in terms of the internet’s trajectory towards negative aspects such as surveillance and misinformation. Ensuring diversity and inclusion in internet standards bodies is key, and predicting future technology advancements should focus on understanding user demands. Regulation, especially with regards to cryptocurrency and AI, needs to be comprehensive and inclusive. Inclusivity, human rights, and the prevention of negative impacts on society should be at the forefront of decision-making.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Technology and Human Rights Due Diligence at the UN | IGF 2023 Open Forum #163

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Amalia M. Toledo-Hernández

The Wikimedia Foundation is a crucial supporter of Wikipedia and other digital projects focused on providing free knowledge to all. They accomplish this through the provision of technical infrastructure and support from volunteers. Wikimedia project content is available under Creative Commons open licenses, enabling widespread access and reuse.

Access to digital public spaces and knowledge repositories is increasingly important for active participation in public life and reducing inequalities. Unfortunately, there is insufficient investment in both technical infrastructure and the fields that produce and organize knowledge, including journalism, academia, cultural heritage institutions, and libraries. An urgent need exists for support in these areas, alongside the implementation of legal structures and free licensing.

Barriers to accessing digital public spaces exacerbate existing inequalities, making it crucial to address and promote social welfare and equity through knowledge access and sharing.

Regrettably, there is a trend of investing in proprietary technology rather than digital public infrastructure. This prioritization restricts access to critical knowledge and hampers the development of digital public spaces. The narrative around digital transformation often prioritizes electioneering over empowering people, necessitating increased investment in digital infrastructure for equal knowledge access.

Cultural institutions face sustainability challenges due to budget cuts caused by the pandemic. This situation severely limits their ability to digitize and make knowledge accessible to wider audiences.

Regulatory trends favor commercialized models, neglecting decentralized and community-led platforms like Wikimedia. Such platforms are valuable and should be protected to ensure their growth and impact.

Regulatory proposals should enable online participation and collective knowledge creation. Failure to promote online participation undermines the potential contributions of individuals and communities, while the Wikimedia model demonstrates its societal benefits.

Wikipedia excels in promoting and preserving minority languages. Organized by languages, the platform fosters minority language preservation and offers educational resources. An indigenous group at the Venezuela-Colombia border uses Wikipedia to preserve and teach their language. By including minority languages online, we ensure cultural preservation and equal educational opportunities.

In summary, the Wikimedia Foundation’s support of Wikipedia and digital projects is vital for the advancement of free knowledge. Access to digital public spaces and knowledge repositories is essential for active participation and reducing inequalities. However, greater investment in technical infrastructure and knowledge production is needed. Regulatory trends often overlook community-led models, posing challenges to platforms like Wikimedia. Regulatory proposals should facilitate online participation and collective knowledge creation. Wikipedia’s inclusive platform provides a valuable space for preserving minority languages and offering educational opportunities.

Tomoaki Watanabe

The analysis of the statements reveals several important points. Firstly, there is a difficulty in distinguishing between machine-generated and human-created resources such as texts, music, and videos. This poses challenges for copyright and public domain materials. The issue extends to outputs from generative AI systems, including texts, music, sound clips, images, and videos. Even future technology like 3D scans of object shapes may become confusing in terms of determining their origin.

Tomoaki Watanabe favours the development of a system or practice to distinguish between machine-generated, public domain content and human-created, copyrighted content. The absence of such a system could lead to missed opportunities in terms of utilising public domain resources. Watanabe believes that having a convenience system in place would allow for proper utilisation of these resources.

There are also concerns about improper usage of creative commons licenses in the digital archives sector, leading to real-world risks. Many institutions around the world are improperly using creative commons licenses, affecting the digital reproduction of public domain works. This unjustified usage not only poses theoretical risks but also has concrete consequences.

On the other hand, improving motivation in museums and similar institutions is seen as positive. Museums desire recognition or returns for their investment in digitising paintings and other content. Implementing standardized signaling systems for recognition can enhance motivation and ease of use, thereby benefiting the institutions.

While there is a need for recognition and benefits for contributors, it is stated that new legal rights may not be necessary. Museums have introduced restrictions without legal force due to the lack of laws addressing the digitization of public domain works. Instead of legal rights, the implementation of a system that acknowledges contributors and their desired rewards can motivate the enrichment and expansion of knowledge commons.

The existence of AI-generated materials presents both a crisis and potentiality. Uncertainty regarding AI-generated and human-created content can lead to a crisis. However, a rationalized approach to AI-generated outputs can facilitate the expansion of knowledge commons, presenting opportunities for innovation and progress.

Watanabe expresses an interest in learning more about indigenous issues. Additionally, he recognizes the desire of communities to share their indigenous knowledge or traditional knowledge resources globally. This observation aligns with SDG 10: Reduced Inequalities and SDG 16: Peace, Justice, and Strong Institutions, highlighting the importance of respecting and valuing indigenous knowledge.

However, Watanabe does not entirely support the current individualistic approach based on intellectual property rights to govern the knowledge. This suggests a need for a more inclusive and culturally sensitive approach that respects the indigenous populations’ way of handling their knowledge.

In conclusion, the analysis highlights the challenges in distinguishing between machine-generated and human-created resources, the need for a system to differentiate copyrighted and public domain materials, concerns about improper usage of creative commons licenses, the importance of motivation in museums, the debate on legal rights versus recognition for contributors, the opportunities and crises presented by AI-generated materials, the importance of respecting indigenous knowledge, and the need for a more inclusive and respectful approach.

Moderator

The discussion centres around the importance of digital public goods, particularly Wikipedia and other Wikimedia projects, in contributing to the development of Sustainable Development Goals (SDGs). These projects are viewed as open resources that provide free access to knowledge and information. Wikipedia, in particular, is described as an open encyclopedia that freely shares knowledge. Content on Wikimedia projects is created under a Creative Commons open licence, allowing for access, reuse, and remixing. The collaborative nature of Wikipedia is commended for its ability to gather accurate information from contributors across different borders.

In addition, the need for a secure and robust public information infrastructure to support these valuable resources is emphasised. It is argued that infrastructure support goes beyond technological aspects and includes legal structures and open and free licensing of various types of information. The production and organisation of knowledge require support from multiple fields such as journalism, academia, cultural heritage institutions, and libraries. Therefore, it is argued that a secure and robust public information infrastructure is essential for the sustainability of digital public goods.

The discussion also highlights the sustainability crisis faced by institutions responsible for creating and organising knowledge. These institutions, especially in the Latin American region, have experienced budget cuts, lack of resources, and insufficient funding. This crisis is attributed to limited availability of resources and financial support necessary for digitising their works. To address this issue, public support and investment are suggested to ensure the sustainability of these institutions and their contributions to collective knowledge.

The regulatory landscape is another aspect of the discussion, focusing on Wikimedia projects and the failure of regulatory proposals to consider the decentralised and community-driven nature of these projects. Instead, regulations tend to target centralised and commercialised models, disregarding the importance of public participation. The effectiveness of the Wikimedia model over the past 20 years is emphasised, suggesting that regulatory trends should acknowledge the positive contributions of Wikimedia projects.

The impact of technology and the internet on the knowledge commons is also explored. Concerns arise regarding the risks associated with AI-generated content, including the difficulty of distinguishing between human and AI-generated content. These risks are particularly relevant in maintaining the integrity and veracity of online information. Copyright is highlighted as a potential barrier and a blunt instrument that often incentivises people to monetise and extract revenues, which may not align with the motivation for knowledge creation.

Furthermore, the discussion delves into the need to address inequalities in accessing knowledge commons. Undeveloped countries, especially in the global South, do not fully benefit from the knowledge commons. The global distribution of technology does not correspond with an equitable distribution of knowledge, and indigenous knowledge systems are not adequately represented or protected. To address these issues, international regulations and inclusive education are proposed as potential solutions.

The importance of education is also emphasised, particularly in the context of technology. The United Nations (UN) is suggested as an initiator of global educational initiatives that focus on soft skills and include stakeholders. Education is seen as crucial to enable individuals to effectively use new technology. Additionally, it is acknowledged that the current development of technology primarily rests in the hands of western-based stakeholders, underscoring the need for an inclusive and comprehensive approach to education.

Another significant aspect of the discussion is the preservation and promotion of minority languages. Wikipedia’s language organisation is commended for allowing minority languages to thrive and preserve their linguistic heritage. Collaboration between indigenous communities and educational institutions, such as the Ministry of Education in Colombia, is applauded for working on educational resources in indigenous languages through Wikimedia projects.

In conclusion, this discussion highlights the invaluable contribution of digital public goods, particularly Wikipedia and other Wikimedia projects, to the achievement of SDGs. The need for a secure and robust public information infrastructure, sustainable funding for institutions creating and organising knowledge, inclusive regulations, education for inclusiveness, and preservation of minority languages are all crucial elements in realising the potential of digital public goods. Investment in infrastructure is considered critical to avoiding free-riding and achieving long-term sustainability. Moreover, the regulation of the internet, as well as the use of AI-generated content, should be approached with care to maintain integrity and protect the knowledge commons.

Ayalew Shebeshi

The three statements provided express concerns about the United Nations’ (UN) current activities, which they argue are primarily based on the rules and regulations of developed nations. They believe these rules are highly structured and call for a shift towards incorporating soft skills in the planning and regulation of knowledge commons.

The advancement of technologies like AI, blockchain, and IoT has generated a vast amount of data and information, leading to the belief that knowledge is wealth. However, the speakers argue that the current regulatory tendencies of the UN are not keeping pace with technological advancements and evolving knowledge.

To address these concerns, the speakers propose establishing common international regulations developed with the participation and agreement of all UN members, emphasizing the need for inclusivity. They suggest moving away from a predominantly structured approach and incorporating softer skills such as negotiation, collaboration, and cultural understanding.

Additionally, the speakers advocate for education initiatives by the UN that reach every part of the globe. They stress the importance of educating stakeholders worldwide, particularly in underdeveloped countries and the Global South. They argue that while technology is becoming ubiquitous, education should strive to reduce inequalities and bridge the digital divide.

In summary, the speakers call for a change in the UN’s current activities, aiming to address limitations imposed by existing rules and structures influenced by developed nations. They propose incorporating soft skills, promoting inclusivity in international regulations, and prioritizing global education initiatives to better regulate knowledge commons and reduce inequalities on a global scale.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Successes & challenges: cyber capacity building coordination | IGF 2023

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Claire Stoffels

The analysis reveals several key points about cyber capacity building coordination. Firstly, there is a lack of coordination among stakeholders, leading to diverging objectives, different approaches, and duplication of actions. This lack of coordination hinders the overall effectiveness of cyber capacity building efforts.

On the other hand, successful coordination requires a inclusive, demand-driven, and context-specific approach. Cyber security transcends many communities of practice, necessitating regional collaboration and a shared understanding of the specific needs and challenges faced by different regions.

Trust is identified as a crucial component for effective cooperation in capacity building. However, building trust is challenging due to the presence of different policy fields and institutions. Luxembourg, perceived as neutral and trustworthy, has played a role in relationship building by fostering trust among stakeholders.

Another challenge is the development of scalable models for coordination. Coordinating capacity building efforts sustainably is a significant concern. Establishing mechanisms that allow for the efficient coordination of efforts while adapting to different contexts and needs remains a challenge.

Furthermore, the analysis highlights the risks posed by a lack of coordination in cyber capacity building, namely duplication of efforts and the lack of coherence. Coordinating actions and sharing information across stakeholders is vital to avoid these risks and ensure a cohesive and efficient approach to capacity building.

The importance of multi-stakeholder approaches and partnerships is emphasized. Bringing together stakeholders from diverse sectors and actively engaging them in capacity building efforts can lead to more comprehensive and effective outcomes. Luxembourg has been successful in fostering multi-stakeholder approaches and partnerships, collaborating with the national cybersecurity agency and coordinating efforts across sectors.

The analysis also points out the benefit of using coordination platforms and practitioner groups in cyber capacity building. Luxembourg has joined various coordination platforms and practitioner groups, such as the GFCE and EU Cybernet, finding them beneficial in facilitating coordination and collaboration.

The D4D Hub is highlighted as a valuable platform for exchanging information, sharing best practices, lessons learned, and improving projects. Despite the challenges in gathering information, the hub serves as an important element in project inception and formulation.

Lastly, the analysis underscores the role of donors and implementers in promoting awareness, enhancing communication, and facilitating cooperation and knowledge sharing. Claire Stoffels endorses the idea that donors and implementers have a responsibility to play a larger role in capacity building efforts.

In conclusion, the analysis identifies the need for enhanced coordination in cyber capacity building. It emphasizes the importance of inclusive, demand-driven, and context-specific approaches, building trust among stakeholders, developing scalable models for coordination, and fostering multi-stakeholder approaches and partnerships. Using coordination platforms and practitioner groups, such as the D4D Hub, can also support information exchange and project improvement. Additionally, donors and implementers should take an active role in promoting awareness and facilitating cooperation among stakeholders.

Donia

The discussion revolves around the concept of capacity-building in the context of community development and technological solutions. Both participants agree that capacity-building should be seen as a comprehensive approach encompassing various aspects, such as community awareness, legal frameworks, and governmental policies. They argue that solely focusing on technology solutions is insufficient.

The speakers emphasize the importance of adopting a holistic approach to capacity-building. This approach should involve not only technological advancements but also community awareness, including educating individuals about the benefits and implications of technology solutions. They also stress the significance of developing legislative frameworks and government policies that encourage capacity-building, as these are crucial for creating an enabling environment for sustainable development.

The participants provide supporting facts, including questions posed by online participants, which demonstrate a concern for broader aspects of capacity-building beyond technology. They also suggest that capacity-building extends beyond the requirements of SDG 9 (Industry, Innovation, and Infrastructure) and SDG 11 (Sustainable Cities and Communities) to include SDG 16 (Peace, Justice, and Strong Institutions). This highlights the extensive scope and potential impact of capacity-building beyond immediate development goals.

Throughout the discussion, the sentiment of both speakers remains neutral. They present their arguments in a balanced manner, without expressing a strong positive or negative stance on the topic. This neutral sentiment indicates a willingness to engage in an open and constructive dialogue on the subject of capacity-building and its multifaceted nature.

In conclusion, the discussion underscores the importance of considering capacity-building as an end-to-end process that encompasses technological solutions, community awareness, legal frameworks, and governmental policies. The participants argue that capacity-building should not be limited to technological advancements alone. By addressing these diverse aspects, capacity-building can foster sustainable development, promote social progress, and contribute to the achievement of various SDGs.

Anatolie Golovco

During the discussion on cybersecurity, speakers emphasised the significance of the human element in protecting computers against cyber threats. They stressed the need for individuals with the right values, ethics, and technical skills to be involved in the field. Cybersecurity is ultimately about good people safeguarding computers from bad actors.

Insufficient coordination and a lack of clarity in project objectives were identified as challenges in implementing cybersecurity initiatives. When beneficiaries lose sight of project goals midway, misalignment in project delivery occurs. This issue can be compounded by competition among donors and a lack of clarity in defining project needs. To address this, speakers advocated for improved planning and better coordination among states. States should clearly articulate project needs and roles to donors, facilitating better alignment of objectives and successful project implementation.

One proposed solution involved a three-layer mechanism for effective coordination in cybersecurity efforts. This mechanism consists of a cybersecurity council, smaller groups for peer review, and the Ministry of Economy and Digital Development, each with defined roles. This approach was regarded as efficient and conducive to better coordination, ensuring project objectives are met. The role of clear policies formulated by the Ministry of Economy and Digital Development, which help translate plans into action, was also highlighted.

Another crucial aspect discussed was the need for a people-centric approach and a re-evaluation of the cybersecurity architecture. Reducing the complexity of tools and rethinking the overall architecture are necessary steps. Speakers emphasised the importance of focusing efforts on strategy rather than merely adding layers of security to a faulty system. There should be a substantial effort invested in rethinking the ecosystem to ensure effective cybersecurity.

Throughout the discussion, it was noted that adapting project timelines to accommodate the speed of learning and the dynamic nature of cyber threats is often challenging. Donors may face difficulties synchronising their contributions with the rapidly evolving needs of the field, resulting in a focus on acquiring tools rather than developing the individuals involved. Therefore, speakers called for a greater focus on the people in the cybersecurity process, prioritising their training and education alongside procurement of tools.

In conclusion, the discussion underscored the vital role of the human element in cybersecurity. It stressed the need for individuals with the right values, ethics, and skills, alongside improved coordination and clear project objectives. A three-layer mechanism, supported by coordinated policies, can enhance coordination, and a people-centric approach, along with a reassessment of the cybersecurity architecture, may lead to more effective protection against cyber threats. Speakers called for greater attention to be given to the development of individuals in the field, emphasising their training and education as essential components of cybersecurity initiatives.

Louise Hurel Marie

The analysis emphasises the importance of better understanding and coordination among countries when it comes to supporting capacity building in specific regions. It argues that in order to avoid duplication of efforts and overloading of recipient countries, a more coordinated approach is needed. The analysis also highlights the crucial role of political buy-in for the success and sustainability of cyber capacity building initiatives. It states that without the government seeing capacity building as a priority, it becomes challenging to gain traction and achieve desired outcomes.

Another key point raised is the need to break down cyber capacity building into more specific categories. The analysis suggests that traditional cyber capacity building, capacity building for crisis response, and capacity building for conflict or post-conflict recovery can be considered as subcategories. By doing so, it becomes easier to define and address the specific needs and challenges in each area.

Insufficiencies in coordination of capacity building efforts can lead to poor sustainability measurement, according to the analysis. It argues that donor countries and recipient countries may lack effective measurements for longer-term sustainability efforts. This can result in one-off efforts or effects, with impact measurement focused on specific projects rather than holistic outcomes.

In contrast, the analysis also highlights the positive impact of longer-term programs and sustainable recommendations in capacity building. It suggests that building a longer-term capacity building program in a region could enhance sustainability. Additionally, both donors and implementers could benefit from developing and adopting broader measurements of impact beyond individual projects.

Insufficient domestic coordination is identified as a potential challenge in capacity building efforts. The analysis points out that multiple departments within a single government may conduct different types of capacity building efforts, potentially complicating coordination. Recipients might also be overwhelmed by multiple offers and struggle to designate the appropriate point of contact. This lack of coordination can lead to complications and inefficiencies in capacity building.

The analysis recommends that coordination and trust-building between countries prior to crisis assistance can enhance the effectiveness of capacity building efforts. It states that countries that have provided assistance in a crisis often had a previous relationship, highlighting the importance of trust and prior coordination. Mechanisms such as Memorandums of Understanding (MOUs) and institutionalized responses, such as the European Union’s Permanent Structured Cooperation (PESCO) framework, are cited as examples that can increase the effectiveness of coordinated responses.

Crisis response is seen as an opportunity for countries to gain political visibility and set up new coordination mechanisms to enhance sustainability. The analysis mentions the establishment of the Center for Cybersecurity Capacity Building in the Western Balkans as an example of leveraging crisis response to create new mechanisms. It suggests that the crisis response capacity building type and the broader cybersecurity capacity building can complement each other depending on the context.

Progress is reported in international-level discussions on addressing cybersecurity issues. The analysis highlights the existence of working groups on incident response and cyber diplomacy as part of the Global Foreign and Cyber Expertise (GFC) platform. It also notes that different communities meet and discuss in informal settings at the international level, indicating ongoing efforts in addressing cybersecurity challenges.

Challenges still exist at the domestic level depending on the country and culture, states the analysis. It points out that different departments in the government may have varying understandings of cybersecurity. Additionally, community engagement varies depending on the maturity of a particular stakeholder group. This suggests the importance of considering context-specific challenges and cultural nuances when designing and implementing capacity building initiatives.

Civil society organizations and think tanks are highlighted as crucial actors in bridging different communities. The analysis emphasizes their role in involving as many stakeholders as possible during the planning and designing of specific projects. Their involvement can help ensure a more inclusive and comprehensive approach to capacity building.

The analysis also suggests including recipients in the design phase of projects. Providing a bigger inception phase, where stakeholders can engage and provide input, can help create ownership and increase the chances of successful implementation.

Lastly, the analysis calls for designing a typology that accounts for contextual considerations in cyber capacity building. It argues that the evolving landscape in terms of agencies, stakeholders, crises, and conflict or post-conflict situations should be taken into account. This would enable a more nuanced and tailored approach to address the diverse needs and challenges in different contexts.

In conclusion, the analysis underscores the importance of better coordination, political buy-in, and sustainability measurement in cyber capacity building efforts. It also highlights the need for longer-term programs, domestic coordination, and trust-building between countries. The analysis recognizes the progress in international-level discussions and acknowledges the challenges at the domestic level. Additionally, it emphasizes the role of civil society organizations and think tanks, as well as the involvement of recipients in project design. Overall, the analysis provides valuable insights for policymakers and stakeholders involved in enhancing cyber capacity building efforts.

Rita Maduo

The rapidly evolving and complex cyber landscape presents challenges in coordinating cyber capacity building projects. The difficulty lies in the constant need to update strategies and priorities in response to new technologies and their associated threats and vulnerabilities. This negative sentiment arises from the fast-paced nature of the cyber landscape, which makes coordination increasingly challenging.

Emerging economies like Botswana face additional obstacles due to limited resources. Adapting to the changing cyber environment is expensive, requiring substantial funding that may not be readily available. This limitation hinders the training of cybersecurity experts and the management of complex vulnerabilities, further exacerbating the challenges faced by these countries.

Insufficient coordination in cybersecurity efforts has negative consequences. It creates weaknesses in a country’s overall cybersecurity posture, making it exploitable by cybercriminals. Ineffectual coordination also leads to gaps and vulnerabilities, hindering the effectiveness of cybersecurity programs. Additionally, inefficient resource allocation is a direct result of insufficient coordination, leading to wasted resources and misplaced priorities. Overall, insufficient coordination limits the effectiveness of cybersecurity initiatives.

Effective information sharing is crucial for cybersecurity. Insufficient coordination hampers the sharing of threat intelligence between entities, making it more challenging to detect and mitigate cyber threats. Timely and accurate information sharing is essential for robust cybersecurity measures, underscoring the importance of coordination in this area.

A positive stance is taken, emphasizing the need for proper coordination among stakeholders for effective cybersecurity. Timely and accurate information sharing between stakeholders strengthens cybersecurity efforts and can only be achieved through coordination and collaboration. This positive sentiment highlights the significance of coordination in establishing robust cybersecurity measures.

Successful cyber capacity building requires a multifaceted approach and sustained commitment from all parties involved. Donors, implementers, and recipients must demonstrate ongoing commitment to achieve long-term success. The multifaceted approach includes embracing diverse perspectives and voices in cyber capacity building initiatives. By avoiding a stagnant approach, the positive sentiment emphasizes the importance of involving different stakeholders in cyber capacity building.

In conclusion, the summary highlights the challenges faced in coordinating cyber capacity building projects in the rapidly evolving and complex cyber landscape. Limited resources, insufficient coordination, and a lack of information sharing hinder progress in strengthening cybersecurity measures. However, the positive outlook emphasizes the importance of proper coordination, sustained commitment, and the inclusion of diverse voices in cyber capacity building initiatives. Addressing these challenges is crucial for enhancing cybersecurity globally.

Hiroto Yamazaki

The discussion on cybersecurity coordination explores the challenges that arise when multiple stakeholders are involved. One key issue is the presence of too many organizational stakeholders in cybersecurity, which hinders full coordination. This fragmentation of stakeholders is observed in various layers, including divisions between private and government entities, technical and policy experts, and different countries or regions. The lack of a unified approach and participation from all relevant organizations impedes effective coordination.

Another challenge is the difficulty in achieving full coordination due to the focus on bilateral cooperation. The Japan International Cooperation Agency (JICA), a key player in cybersecurity cooperation, bases its efforts on bilateral agreements between Japan and recipient countries. This approach requires JICA to align its initiatives with the recipient country’s own cybersecurity approach, strategy, and specific needs. While bilateral cooperation is important, it poses challenges in achieving comprehensive coordination across multiple countries and stakeholders.

However, it is stressed that respecting the recipient country’s ownership in bilateral agreements is crucial. JICA adheres to the policy of recognizing the recipient country’s authority and strives to follow their approach and strategy in cybersecurity cooperation. By acknowledging and respecting the recipient country’s ownership, JICA aims to foster a collaborative environment and ensure its efforts align with the recipient country’s priorities.

Inadequate coordination within JICA’s cybersecurity capacity building initiatives is identified as a problem, leading to negative effects such as reduced efficiency, failure to maximize development impact, and a lack of sustainability. The challenges stem from duplication of assistance, limited resources, an excessive number of resources, and isolated approaches to assistance. These factors contribute to suboptimal results and negative implications in JICA’s cybersecurity capacity building projects.

To address the lack of coordination, JICA employs two strategies: bilateral efforts and multi-stakeholder efforts. In bilateral efforts, interactions with Cambodian partners and organizations such as Cyber for Development are used to reduce duplication and enhance coordination. Additionally, JICA recognizes the importance of engaging multiple stakeholders, as evidenced by their technical cooperation project in Thailand, where they collaborate with ASEAN member states, the ASEAN Secretariat, and other donors. By incorporating multiple stakeholders in their initiatives, JICA aims to foster a more coordinated and comprehensive approach to cybersecurity capacity building.

A noteworthy success is JICA’s technical cooperation project in Thailand. With the collaboration of ASEAN member states, the ASEAN Japan Cyber Security Capacity Building Center conducts training and contests, contributing to the overall improvement of cybersecurity in the region. This success story highlights the positive outcomes that can be achieved through effective coordination and collaboration.

Furthermore, the discussion emphasizes the importance of coordinating with multiple stakeholders or through bilateral interactions to maximize development impact. It highlights the need to reduce duplication and harmonize efforts through coordination. The significance of creating sustainable outcomes, such as establishing guidelines and training materials, is also recognized in the cybersecurity field.

While some sentiment expresses negativity towards the one-time training or meeting approach, suggesting it is not an effective means of achieving coordination, there is positive sentiment towards delayed or time-difference coordination. This approach allows for longer periods of interaction and enables donors to engage with recipient countries even after initial engagement has taken place.

In conclusion, the discussion on cybersecurity coordination sheds light on the challenges faced by various stakeholders in the field. These challenges include the presence of numerous organizational stakeholders, difficulties in achieving full coordination due to the focus on bilateral cooperation, and inadequate coordination within JICA’s initiatives. Strategies such as bilateral efforts and multi-stakeholder engagement are identified as potential solutions. The importance of respecting recipient country ownership, creating sustainable outcomes, real-time coordination, and employing more long-term approaches is also emphasized. By addressing these challenges and implementing effective coordination strategies, collaboration and impact in cybersecurity capacity building can be improved.

Calandro Enrico

The proliferation of cyber capacity-building efforts has resulted in challenges in aligning strategies, priorities, and activities among donors, recipients, and implementers. These efforts aim to improve cyber resilience and skills in the face of increasing cyber incidents, state-sponsored attacks, and cybercrime. However, the sheer number of initiatives has created difficulties in coordinating and harmonising these efforts.

To address these challenges, a roundtable discussion is being organised, involving representatives from various sectors, such as the internet governance forum, government officials, civil society, technical community, recipients, donors, and implementers of cyber policy. The objective of this discussion is to assess the achievements and difficulties in coordinating cyber policy activities. The outcomes of this discussion will be formulated into a policy brief, which will serve as a guideline for stakeholders involved in the field of cyber capacity building.

In the realm of cybersecurity, it is crucial for project deadlines to adapt to the learning speed of the individuals involved. Human learning speed often falls behind the strict timelines set for cybersecurity projects. Thus, the focus should shift towards prioritising people and knowledge over rigid deadlines. This approach will ensure proper skill development and overall project success.

Political willingness and transparency are essential aspects of cyber capacity-building projects. Governments are investing substantial financial resources in these endeavours; however, political will from donors is necessary to secure funding. Additionally, transparency in the use of funds is crucial, as it provides stakeholders with an understanding of how the financial resources are being utilised.

Cyber capacity building not only serves as a means to enhance technical capabilities but also as a diplomatic tool to strengthen partnerships. It can be utilised to foster collaborations and build relationships between nations. This perspective highlights the multifaceted nature of cyber capacity building, extending beyond technical aspects.

The Global Forum on Cyber Expertise offers numerous mechanisms for improving coordination in cyber capacity building. These mechanisms include the Clearing House Mechanisms, regional donor meetings, and the publicly available Cyber Portal, which collects data and information related to cyber capacity building projects over the years. Despite these resources, there is a need for increased awareness and effort to enhance global coordination in cyber capacity building.

Inefficiencies and duplication of assistance can be avoided through effective communication and coordination. Examples from Cambodia demonstrate the importance of proper coordination in cybersecurity capacity building. The ASEAN Japan Cyber Security Capacity Building Centre (AJCCBC) serves as a coordination mechanism, hosting training sessions and facilitating collaboration among different organisations. Encouragingly, there is a desire for other donors to explore potential collaborations through the AJCCBC to improve coordination within the ASEAN region.

In conclusion, the influx of cyber capacity building efforts has led to challenges in aligning strategies and activities across various stakeholders. Coordinating these initiatives requires political willingness, transparency in the use of funds, and the use of available resources. Furthermore, there is a need for increased global coordination and effective communication to avoid duplication and enhance efficiency. The examples from Cambodia and the establishment of the AJCCBC exemplify the importance of coordination and collaboration in cybersecurity capacity building.

Tereza Horejsova

The coordination and effectiveness of cyber capacity building efforts face significant challenges due to a competitive environment and a lack of sharing. The competitive nature of the field makes coordination difficult, hindering cooperation and collaboration among actors involved in cyber capacity building. This leads to a lack of project continuity and a decrease in overall impact. Insufficient sharing of information and collaboration among stakeholders also contributes to problems, particularly with duplication of projects that overwhelm recipients and waste resources. Improvement is needed in the needs assessment process, which is currently time-consuming for individual projects.

The issue of projects being supply-driven rather than demand-driven is also prevalent in cyber capacity building. This approach fails to consider the specific needs and challenges faced by recipients, resulting in projects that may not fully meet their requirements. To address this, it is important to listen attentively to the needs of recipient countries and take their unique circumstances into consideration.

Various approaches and platforms have been suggested to enhance coordination and effectiveness in cyber capacity building. The Global Forum on Cyber Expertise (GFC) serves as a valuable platform for dialogue, information exchange, and networking among actors involved in cyber capacity building. The GFC’s Clearinghouse mechanism matches government needs with the right implementers and donors, while the Sybil portal aids in project mapping, improving coordination and resource utilization.

A sustainability outlook is crucial for lasting and effective impact in cyber capacity building. Projects lacking sustainability may provide quick fixes but not long-term impact. It is necessary to consider the goals of sustainable development and ensure projects contribute to them.

Connecting the development community with the cyber community is also important for improved efficiency and better solutions in the future. Learning from the development community’s expertise enhances cyber capacity building efforts and outcomes.

Promoting openness and increasing communication among stakeholders plays a vital role in enhancing coordination. Transparency, sharing best practices, and facilitating information exchange allow stakeholders to work together effectively.

To overcome these challenges, it is crucial to improve coordination through platforms like the GFC, listen attentively to the needs of recipient countries, promote dialogue and exchange between the development and cyber communities, and foster openness and increased communication. These measures will contribute to more efficient and sustainable outcomes in cyber capacity building.

Regine Grienberger

The analysis examines various aspects of cyber capacity building and explores the challenges and opportunities associated with it. Germany acknowledges that cyber capacity building is a relatively new topic within its foreign office. They recognize its significance as a diplomatic tool to strengthen partnerships and ensure stability in cyberspace. However, one of the primary obstacles is the difficulty in securing funding for such projects. This is largely due to budget restraints and the need for political willingness, which in turn depends on risk awareness.

While funding is crucial, it is not the sole factor in implementing cyber capacity building measures. The analysis highlights the need for human resources with expertise in cybersecurity. Simply having financial resources is not enough; experts are necessary for effective implementation. The establishment of platforms, such as the EU cybernet, is essential for facilitating the identification and development of train-the-trainer programs, ensuring a skilled workforce capable of implementing capacity building initiatives.

Transparency in the investment of trust funds is lacking within the field of cyber capacity building. It is important to understand how the allocated funds are being utilized and what outcomes are being achieved. This transparency ensures accountability and can help in identifying areas for improvement and learning from past experiences.

Understanding the needs of recipients is crucial for a successful cyber capacity building project. This understanding often begins with the development of cybersecurity strategies. Expressing and admitting these needs becomes a starting point for effective collaboration and assistance.

Coordination plays a significant role in the implementation of cyber capacity building initiatives. However, it is important to note that coordination should not favour certain recipients. In development cooperation, there are instances where some recipients are given preferential treatment, while others may be overlooked. Overcoming this bias is essential to ensure fair and equal distribution of assistance.

The analysis also emphasizes the importance of regional cooperation in addition to global cooperation. Mechanisms should be developed that foster collaboration among neighbouring countries, enabling them to assist each other in addressing common challenges in cyberspace.

The field of cyber capacity building should be viewed as a two-way street. It should not only focus on the traditional donor-recipient relationship seen in development cooperation. Instead, it should encourage mutual learning and knowledge sharing between all parties involved to create a more comprehensive and conducive cybersecurity environment.

Digital development cooperation should include cyber capacity building as it is integral to digital transformation. Enhancing the skills and capabilities of public administrations as they transition into the digital realm requires a strong focus on cybersecurity. This includes providing the necessary hardware and software to ensure robust cybersecurity measures are in place.

In conclusion, the analysis highlights various aspects of cyber capacity building, including the challenges of funding, the importance of human resources, the need for transparency, understanding recipients’ needs, the role of coordination, the significance of regional cooperation, and the integration of cyber capacity building into digital development cooperation. These insights provide valuable considerations for policymakers, funders, and implementers in their efforts to build strong and secure cyber capabilities.

Audience

The Budapest Convention plays a crucial role in cybersecurity by providing a legal basis for capacity building programs. These programs aim to ensure consistency and sustainability in equipping countries with the necessary knowledge and skills to combat cyber threats. A key feature of these programs is their emphasis on localized training, where trainees become trainers themselves, cascading the knowledge to others. This localized approach expands the reach and impact of capacity building efforts.

The Budapest Convention also highlights the importance of South-South Cooperation, where individuals from different regions participate in the capacity building program. For example, an African judge in Ghana may train judges in Kenya, fostering collaboration and knowledge sharing. This approach strengthens partnerships and promotes a collective response to cybersecurity challenges.

Regional cooperation plays a vital role in capacity building as well, facilitated by the Budapest Convention. Countries, such as Albania and Montenegro, collaborate to collectively address common cybersecurity challenges, sharing resources and expertise. This regional approach enhances collaboration, stability, and the effectiveness of capacity building initiatives.

The establishment of a point of contact in each country, compliant with international law, is strongly advocated. The 24-7 network provided by the Budapest Convention ensures a stable point of contact, enabling effective coordination and communication during cybersecurity incidents. This promotes international standards and legal obligations.

While a separate legal basis for capacity building programs is not immediately necessary, better utilization of existing legal frameworks is recommended. Utilizing existing treaties that already have capacity building programs ensures sustainable and coordinated efforts.

Donor countries have a significant role in supporting capacity building. Drawing lessons from past development experiences can enhance demand-driven capacity building in cybersecurity at the national level. By leveraging these experiences and knowledge, countries can improve their capacities and contribute to international cybersecurity goals.

Overall, the Budapest Convention serves as a foundation for capacity building programs in cybersecurity, promoting localized training, South-South Cooperation, and regional cooperation. It emphasizes the establishment of stable points of contact and the utilization of existing legal frameworks. Donor countries can improve capacity building efforts by learning from past experiences and improving capacity at the national level, ultimately contributing to global cybersecurity goals.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Stronger together: multistakeholder voices in cyberdiplomacy | IGF 2023 WS #107

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

John Hering

The analysis includes various speakers discussing cybersecurity and multi-stakeholder inclusion in dialogues. One speaker notes the increasing professionalism of cybercrime, with a growing focus on critical infrastructure sectors. Microsoft’s annual digital defense report highlights this trend. Moreover, 41% of observed nation state cyber operations target critical infrastructure.

Another speaker raises concerns about the integration of cyber operations in armed conflict, citing the situation in Ukraine as an example. Urgent discussions, particularly at the United Nations, are needed to address this rising concern.

The ownership and operation of cyberspace by private entities is also discussed. It is emphasised that cyberspace is primarily owned and operated by private entities, necessitating a proper multi-stakeholder approach to tackle conflicts in this shared domain.

Improving the United Nations’ processes for including multi-stakeholder voices in cybersecurity dialogues is identified as a key issue. The current approach is described as ad hoc and patchwork.

The importance of accountability and understanding existing cybersecurity norms is highlighted. Holding countries accountable for violating norms and focusing on implementation rather than creating new norms are deemed important.

Another speaker advocates for multi-stakeholder inclusion in future cybersecurity dialogues. The non-governmental stakeholder perspective is considered essential for impactful outcomes, transparency, and credibility.

Challenges faced by non-governmental stakeholders in engaging with processes like the Open-Ended Working Group are discussed. The speaker acknowledges the progress made since the first multi-stakeholder consultation in 2019.

Improving the process of multi-stakeholder engagement and learning from successful first committee processes are advocated for. Structured non-governmental stakeholder engagement and a comparison with successful processes are seen as crucial.

The hindrance of multi-stakeholder inclusion in dialogues by escalating geopolitical tensions is mentioned. It is noted that these tensions have blocked voices, including Microsoft, from participating effectively.

The importance of multi-stakeholder inclusion in future dialogues is stressed, highlighting its role in transparency, credibility, and aiding in implementation efforts.

Insights from different stakeholders are valued for a holistic understanding of the issues. Effective dialogues and engagement with governments are seen as important for gaining insights into their perspectives.

The goal of achieving a gold standard of multi-stakeholder inclusion is expressed. Working towards a higher level of inclusion is seen as necessary.

The legitimacy of questioning the involvement of private companies in discussing governance at national or international levels is acknowledged. However, it is argued that these companies should have a voice in such dialogues, with decision-making authority ultimately resting with governments.

The summary accurately reflects the main analysis, covering various aspects of cybersecurity and multi-stakeholder inclusion. It includes relevant long-tail keywords and adheres to UK spelling and grammar.

Joyce Hakmeh

The analysis explores the challenges and benefits of multi-stakeholder participation in UN Information Security Dialogues. One of the significant challenges mentioned is that some states actively block multi-stakeholder participation. Additionally, there is a lack of conviction among states regarding the value that multi-stakeholders bring to the table. States often perceive the multi-stakeholder community as a uniform group with the same agenda, which further hampers their participation. Moreover, there is a lack of strategic and consistent engagement with multi-stakeholders by supportive states. This lack of engagement creates uncertainty for multi-stakeholder groups regarding their accreditation in UN processes.

On the other hand, there is a supportive stance towards increased multi-stakeholder participation. The role of multi-stakeholders in the cybercrime convention marks an important milestone as it is the first time they are attempting to shape a legal instrument within the UN regarding cyber issues. Participants argue that multi-stakeholders bring diverse perspectives, and their input can significantly influence decision-making processes. Furthermore, in the context of establishing new processes in cyber and digital technologies governance, it is crucial to include multi-stakeholder participation from the beginning. Transparency and clear criteria for inclusion and exclusion are seen as essential components of good modalities in these governance processes.

The speakers emphasize the need for multi-stakeholders to prove their value through concrete actions such as providing data, conducting research, and offering capacity building. This is especially necessary because some member states do not fully understand the value that multi-stakeholders can bring. Additionally, the analysis highlights the importance of not solely focusing on the multilateral level but also considering the national and regional levels in digital technologies governance.

Collaboration and input from various stakeholders, including civil society organizations and industry, are seen as mutually beneficial. Multi-stakeholder involvement aids governments in quality control and gathering diverse ideas during negotiations and decision-making processes related to digital issues. However, the speakers emphasize the need for these collaborations and inputs to be more strategic, ambitious, and inclusive, rather than narrowly involving only big tech companies.

Furthermore, the analysis suggests that the current composition of multi-stakeholder groups is primarily Western-dominated, calling for more regional inclusion. It is argued that there is a wealth of valuable experiences and perspectives at the regional and national levels that can enhance UN processes and initiatives.

The analysis also highlights the importance of better coordination among multi-stakeholders. While it is important to improve collaboration with governments, it is equally crucial to enhance collaboration among the multi-stakeholders themselves to ensure diverse voices are included in the discussion.

The fragmentation of cyber negotiations is acknowledged as a present reality, with various negotiations focusing on different aspects of cyber issues. The interconnectivity and overlap of activities in cyberspace challenge the artificial separation between negotiations dealing with international peace and security and those dealing with criminal activities.

In conclusion, the speakers advocate for increased multi-stakeholder participation in UN Information Security Dialogues. While there are challenges such as states blocking participation and lack of conviction, the benefits include diverse perspectives, shaping legal instruments, and influencing decision-making processes. The analysis calls for the development of good modalities from the start, the provision of concrete evidence of value by multi-stakeholders, inclusion of regional and national levels, better coordination, and a focus on inclusive collaboration.

Nick Ashton Hart

The analysis explores the need for increased stakeholder participation in policy-making and decision processes, focusing on cybersecurity and international commerce negotiations. The lack of stakeholder involvement and frustration with current procedures are identified as significant issues that need attention.

One speaker emphasises the value that stakeholders bring to these decision-making processes. The absence of their input not only results in the loss of valuable perspectives and expertise but also undermines the legitimacy and effectiveness of the policies and decisions made. Additionally, frustration is expressed concerning the application and veto process in cybersecurity procedures. The closed nature of the World Trade Organization (WTO) negotiations on electronic commerce excludes stakeholders completely, limiting their ability to contribute and raising concerns about transparency and fairness.

In response to these challenges, one speaker proposes the implementation of a policy on stakeholder participation. Such a policy would transform stakeholder involvement into an administrative process, ensuring their perspectives are consistently considered and incorporated into policy-making. It is suggested that many states would support this policy if a vote were to take place, indicating a growing recognition of the need for increased stakeholder participation.

Another speaker supports a campaign to address the issue of stakeholder participation once and for all. Some states are indifferent to involving stakeholders and find the arguments and disagreements on this topic tiresome. A resolution would save time and energy by establishing a clear framework for stakeholder participation. The importance of stakeholder involvement, particularly in the context of cybersecurity, is stressed. It is believed that their participation would drive a more ambitious cybersecurity agenda, bridging the gap between current offerings in international cybersecurity and the actual need for comprehensive and effective solutions.

In conclusion, the analysis highlights the necessity of enhanced stakeholder participation in policy-making and decision processes related to cybersecurity and international commerce negotiations. The establishment of a clear policy or a campaign to address this issue is crucial to bring valuable perspectives and expertise to these processes and to achieve more effective and legitimate outcomes. Furthermore, stakeholder involvement is essential for bridging the gap between the current offerings and the actual need in international cybersecurity, leading to a more comprehensive and robust approach to addressing cyber threats.

Charlotte Lindsey

In a recent analysis, it has been highlighted that the veto power within the Open-Ended Working Group limits the participation of various organizations, a concern raised by Charlotte Lindsey. This poses a challenge for multi-stakeholder civil society organizations who strive to contribute to multiple parallel processes. However, the analysis also acknowledges that civil society organizations play a significant role by providing valuable data, evidence, and practical recommendations.

Another area of concern is the lack of transparency and clarity in the process for non-state actors to contribute. This issue is seen as a barrier to their meaningful engagement. To promote inclusivity, it is suggested that the scope of participation should be extended to include organizations operating at national and regional levels.

Charlotte Lindsey urges the creation of a dedicated forum that includes all stakeholders, as it would foster legitimacy and help shape future instruments. The involvement of civil society organizations in such a forum could facilitate the implementation of cyber norms by connecting different actors and building partnerships.

Additionally, it is recommended that states establish a mechanism that reflects the multi-stakeholder nature of cyberspace. This would enable relevant stakeholders to contribute to discussions and ensure transparency and credibility in decision-making processes.

The analysis also highlights the importance of increasing the representation of African countries in global processes. It notes that there is a willingness among ambassadors from the African Union in Geneva to engage and learn more about these processes. To foster the participation of African countries, there is a need for capacity-building efforts to enhance the skills of representatives from the African Union in negotiations.

To encourage wider participation, it is necessary to demystify the processes involved. Participants from the African Union reported a misconception that they could not contribute due to a lack of familiarity with the debates. Efforts should be made to provide clear information and guidance to potential participants.

Lastly, the analysis emphasizes the importance of fact-based framing and timely input for effective engagement. Even if organizations cannot actively participate in discussions, the ability to produce valuable input is recognized and valued.

In conclusion, the analysis highlights the need for greater inclusivity, transparency, and recognition of the value that civil society and multi-stakeholders bring to the table. Creating dedicated forums, enhancing representation, demystifying processes, and promoting fact-based engagement are essential steps towards achieving these goals.

Speaker

Joyce Hakmeh is the director of the international security program at Chatham House and actively participates in various UN cyber projects. In her role, she leads these projects, focusing on advancing cybersecurity and addressing emerging challenges in the evolving digital landscape. Hakmeh follows UN cyber processes such as the open-ended working group and the cyber crime convention, which play a pivotal role in shaping global standards and policies in the fight against cyber threats. Moreover, she is part of the international security National Research Institute, further showcasing her expertise and dedication to the field.

Nisha serves as the director of the Cyber Security Institute in Geneva and actively engages in UN processes. She is particularly involved in the open-ended working group and the ad hoc committee on cybercrime. Nisha’s primary focus lies in providing evidence and data-driven analyses of the cyber landscape, aiming to develop a comprehensive understanding of the challenges and potential solutions. By utilizing facts and data, she contributes to the formulation of effective strategies and policies to combat cyber threats and ensure a secure digital environment.

Joyce Hakmeh and Nisha both play crucial roles in the field of cybersecurity, making significant contributions to UN cyber processes. They bring their expertise and experiences to the table, actively participating in discussions and decision-making processes concerning global cybersecurity challenges. Through their involvement, they strive to enhance international cooperation and strengthen partnerships in addressing cyber threats.

Overall, the work of Joyce Hakmeh and Nisha underscores the importance of collaboration and knowledge-sharing in tackling cybersecurity issues. Their commitment to the field and active participation in UN cyber processes demonstrate their dedication to improving the security and resilience of digital infrastructure worldwide. Their expertise and insights serve as valuable resources in shaping effective strategies to combat cyber threats and ensure a safer digital future for all.

Pablo Castro

Pablo Castro, a cybersecurity expert, emphasises the importance of implementing existing norms rather than establishing new ones. He believes that instead of focusing on developing new norms, it is more crucial to focus on effectively implementing the current 11 norms. Castro argues that regional-level implementation of norms should be a priority for Latin America. This approach would ensure a strong foundation of cybersecurity practices and strengthen the overall security posture in the region.

Castro also supports the role of stakeholders in assisting states to improve the implementation of cybersecurity norms. He believes that stakeholders, such as industry experts and civil society organizations, can provide valuable insights, expertise, and resources to help states in the process of moving forward. To exemplify this, he mentions that Chile proposed a new set of Confidence Building Measures (CBMs) specifically aimed at leveraging stakeholder involvement to enhance the implementation of cybersecurity norms.

In addition to implementation, Castro highlights the need for capacity building in the Latin American region. He argues that capacity building is crucial to improve cybersecurity efforts and to bridge any existing gaps in expertise and resources. He mentions that several Latin American states made a joint statement in July, highlighting the importance of capacity building in the region.

Castro also emphasizes the need for a strategic approach to engage stakeholders in cybercrime processes. He suggests creating a clear strategy that defines specific roles for stakeholders in future dialogues, such as the Program of Action (PoA). This approach ensures that stakeholders are actively involved in shaping cybercrime policies and addressing challenges related to international law, norms, and Confidence Building Measures.

Advocating for partnerships between stakeholders and states, Castro calls for increased collaboration in specific tasks. He believes that by working together, stakeholders and states can better address the complex challenges of cybersecurity. He encourages stakeholders and states to establish strong working relationships to foster effective collaboration and improve cybersecurity efforts.

Furthermore, Castro underscores the importance of strategic dialogue with stakeholders. He observes that stakeholder opponents often have clear strategies and goals, making it essential for proponents to engage in more strategic and well-planned dialogues. He suggests developing a counter-narrative to address opposition and effectively advocate for stakeholder participation.

Castro also mentions the significance of working beyond formal meetings and rooms to achieve progress in cybersecurity. He believes that a lot of influence can be exerted outside formal settings, particularly at the regional level. He highlights the major opportunities for meetings and collaboration that regional initiatives present, making them critically important for advancing cybersecurity efforts.

From his analysis, Castro notes the struggles countries face in cyber discussions due to geopolitical and cultural differences. He highlights how these differences can lead to fragmentation in discussions and potentially result in different internets in the future. This underscores the importance of finding common ground and fostering collaboration despite these challenges.

In conclusion, Pablo Castro provides valuable insights into the importance of implementing existing norms, engaging stakeholders, building capacity, and forming partnerships in the field of cybersecurity. His emphasis on strategic dialogue, regional initiatives, and the need for an action-oriented approach through frameworks like the Program of Action demonstrates his comprehensive understanding of the challenges and opportunities in the cybersecurity landscape. Overall, his viewpoints contribute to a more holistic and collaborative approach to addressing cybersecurity concerns.

Bert

The Internet Governance Forum (IGF) and the United Nations (UN) have different discussion approaches. While the IGF promotes equal discussions, the UN discussions are more intergovernmental and less friendly to stakeholders. This discrepancy is concerning as it highlights the lack of stakeholder inclusion and equality in the UN’s discussions on cyber governance. The Open Networking Group faces challenges in discussing real-world threats like cyber espionage. It struggles to have an open discussion on these issues, which is important for addressing the evolving threat landscape. To address this, the Open Networking Group needs to be more transparent and open about cyber espionage discussions. Clear violations should be called out, ensuring a better understanding among stakeholders.

Implementing international law is crucial in cyber governance. The General Assembly has confirmed that international law applies fully, but there is a need to focus on better implementation and understanding of the existing normative framework. The Open Networking Group will dedicate sessions to this question next year. Some argue for new norms, while others believe that a better understanding of existing norms is sufficient.

Inclusive multi-stakeholder involvement is key in decision-making processes related to cyber governance. Non-state participants have been invited to negotiations in the Human Rights Commission, and NGO representatives are involved in government delegations in some countries. The Program of Action (POA) should focus on implementing the existing normative framework and involve non-state actors. This collaboration can facilitate efforts and coordination between stakeholders.

The involvement of stakeholders has been politicized, and moving it from a political process to an administrative matter is suggested. This administrative approach can remove unnecessary barriers and streamline decision-making. A one-size-fits-all forever resolution for stakeholder participation may not be ideal, as future circumstances may require different rules.

The upcoming global digital compact discussions should involve various stakeholders, despite opposition from some countries. The input and perspectives of different stakeholders are essential for an inclusive and effective digital compact. Bert supports a strong role for the mighty stakeholder model and the IGF, advocating for an inclusive approach involving industry partners, academics, and experts.

Negotiations must be inclusive, with representation from different countries. Availability of funding for travel aids representation, ensuring active participation from a broader range of countries. The quality of discussions varies based on the level and diversity of participation. Inclusive discussions lead to a better understanding of the issues at hand.

More funding and support are needed to facilitate multi-stakeholder participation in cyber governance. Denial of funding for extensive travels hinders effective participation. The COVID-19 pandemic has unintentionally democratized multilateral processes, allowing for more remote participation and inclusivity. While negotiations occur internationally, it is essential to engage at the national level as well.

Stakeholder involvement in the global digital compact process is emphasized, utilizing the national IGF for discussions and preparation. Partnerships and value contribution are crucial for effective decision-making, amplifying the impact and improving feedback provision.

In conclusion, there are discrepancies between the IGF and the UN discussions on cyber governance. Open and transparent discussions are crucial for addressing real-world threats. Implementation and understanding of existing norms are necessary, alongside multi-stakeholder involvement and inclusivity. Adequate funding and support are needed for equal and inclusive participation. The COVID-19 pandemic has unintentionally increased remote participation and democratized multilateral processes. National and stakeholder engagement are vital for effective cyber governance. The development of a global digital compact requires multi-stakeholder involvement and partnerships, with organizations having a potentially underestimated impact.

Eduardo

The discussion at hand revolves around questioning the legitimacy of companies participating in multi-stakeholder discussions within the sphere of international law development. This topic is relevant to Sustainable Development Goal (SDG) 16, which focuses on achieving peace, justice, and robust institutions.

Several concerns are raised regarding the involvement of companies in these discussions. One concern relates to democratic issues. It is argued that when companies participate in discussions shaping international law, it raises questions about democratic representation. In a democratic system, decisions about laws and regulations are ideally made by elected representatives who are accountable to the citizens. However, the inclusion of companies in these discussions potentially bypasses this democratic process.

Another point of contention revolves around the conflict of interest that companies may have when participating in these discussions. Companies, by their nature, prioritize their own interests and profits. In international law development, where decisions are made with the aim of benefiting society as a whole, the alignment of companies’ interests with broader societal interests becomes a concern. The question arises as to whether the participation of companies in these discussions could lead to biased outcomes that favor their own agendas.

Furthermore, the lack of direct election by citizens is raised as a valid concern in questioning the legitimacy of companies’ involvement. Unlike elected representatives who are accountable to their constituents, companies operate under their own governance structures. This lack of democratic oversight over their participation in multi-stakeholder discussions adds to concerns about the legitimacy and transparency of the decision-making process.

The sentiment towards these issues is negative, as the concerns raised highlight potential flaws in including companies in multi-stakeholder discussions on international law development. However, it is important to note that Eduardo’s stance is neutral as he is simply relaying a question posed by Amir Mokaberi on this matter.

The analysis emphasizes the complexity of balancing the involvement of various stakeholders, including companies, in shaping international law. The insights gained from this discussion emphasize the need for further exploration and deliberation on how to ensure legitimacy, transparency, and democratic representation in such multi-stakeholder forums.

Marie

Cybersecurity discussions have been ongoing since 1998, but their scale has significantly increased in recent years. There is a clear need for broader multi-stakeholder involvement in these discussions, including the participation of the technical community. However, the current level of inclusivity falls short of expectations.

Collaboration between different stakeholders is crucial in effectively addressing cybercrime issues, both within the United Nations and in other forums. Marie emphasizes the importance of connecting cybersecurity discussions in various domains to promote a secure and trustworthy online environment. The emergence of numerous multi-stakeholder initiatives is inspiring and can potentially enrich engagements beyond traditional diplomacy.

The lack of mention of the technical community in the report of the open-ended working group highlights the need for its inclusion in cybersecurity discussions. Marie insists on continuing dialogues with stakeholders such as the technical community, as their involvement enhances understanding of their potential contributions.

While discussions have grown in scale, it is challenging for developing countries to allocate resources and time to processes primarily taking place in Western countries like the UN. Marie highlights the importance of ongoing discussions at national and regional levels, emphasizing the value of long-term engagement in shaping informed policies.

Marie further emphasizes the significance of stakeholder engagement, drawing from her experience working on cyber issues in the Netherlands. She advocates for the use of platforms like the IGF, RightsCon, and GFC for open discussions and aims to demystify discussions in the first committee for stakeholders.

Capacity-building and the spread of knowledge regarding the normative framework are identified as essential elements in the field of cybersecurity. Marie’s team endeavors to share their knowledge about the first committee to enhance engagement, participating in regional meetings and holding cyber policy discussions.

Marie encourages non-governmental stakeholders to share information, facts, and the impact of projects, as this input can add value to the discussions within the context of the UN. Continuous involvement of all stakeholders and their accountability in taking the right positions are crucial. Marie acknowledges that the process can be frustrating but assures that raised issues do make their way into the final reports.

The idea that all stakeholders, including the private sector and civil society, should have a voice in policy-making dialogues related to cybersecurity is strongly supported. This inclusive approach recognizes the importance of considering a wide range of perspectives in shaping effective and comprehensive cybersecurity policies.

In conclusion, cybersecurity discussions have grown significantly since their inception in 1998. Broader multi-stakeholder involvement, particularly including the technical community, is needed to effectively address cybercrime. Inclusivity in these discussions must be improved, and collaboration between different stakeholders is crucial. Regional and national initiatives, capacity-building, and knowledge sharing are essential for robust engagement. Continuous involvement and accountability of all stakeholders are emphasized to ensure the right positions are taken and all perspectives are considered in policy-making dialogues.

Audience

The analysis reveals a significant issue concerning the lack of representation from African stakeholders in multi-stakeholder discussions. This absence is viewed as a negative aspect, highlighting the need for better ways to enhance the participation of African stakeholders in these discussions. The argument is made that the current level of engagement must be improved to ensure that the perspectives and interests of African stakeholders are adequately represented.

Additionally, the analysis emphasises the importance of stakeholder engagement at both the national and regional level, emphasising that it is crucial to strengthen and improve this engagement. It is believed that by doing so, a more inclusive and effective multi-stakeholder approach can be achieved.

The analysis also identifies a common problem faced by civil society organisations, which is a lack of access to engage with the government. However, it is suggested that national and regional level engagement could offer a sustainable solution in addressing this issue.

Furthermore, the analysis highlights the potential benefits of better engagement, stating that it could help strengthen the broader ecosystem of civil society organisations. This indicates that by actively involving and consulting various stakeholders, a more robust and collaborative approach can be fostered.

The analysis brings attention to the fragmentation of the cybersecurity debate, which is seen as a challenge not only for non-state stakeholders but also for many developing countries. Keeping up with multiple tracks of discussion at the UN is particularly challenging for developing countries, making it difficult for them to actively participate in these discussions.

The analysis also touches upon the polarisation of positions on the future of institutional dialogue after OEWG (Open-Ended Working Group). There is a division between those supporting the continuation of discussions on the proposal of a Program of Action (POA) and those against the idea of something legally binding at the moment. Brazil, for example, supports continuing discussions on the proposal of a POA.

Furthermore, concerns are raised about the potential underutilisation of OEWG if the POA is adopted this year. If the decision to adopt the POA is made two years ahead of the end of OEWG’s mandate on regular institutional dialogue, it is feared that OEWG discussions might be undermined.

The analysis also considers the involvement of users in the multi-stakeholder process, highlighting the importance of including users’ perspectives and addressing issues related to defective use and abuse. The role of Microsoft in involving users in multi-stakeholder processes is specifically mentioned.

Lastly, the analysis emphasises the engagement of young people in the tech industry, advocating for their perspective to be taken into account. It highlights how Microsoft incorporates the youth perspective into its submission and ensures that everything is on track.

Overall, the analysis underscores the need for greater inclusivity and participation in multi-stakeholder discussions, particularly concerning African stakeholders. It also highlights the importance of various levels of engagement, the concerns regarding fragmentation and difficulty faced by developing countries in the UN, and the significance of involving users and young people in the decision-making processes.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Scramble for Internet: you snooze, you lose | IGF 2023 WS #496

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Moderator 2

The discussions held at the Internet Governance Forum shed light on the ongoing struggle of Global South countries to ensure internet access and treat it as a basic human right. These discussions reveal a disparity in approaches to internet access and function between the Global North and the Global South. While the Global North countries have a different approach towards internet access, the Global South representatives focus on the fundamental aspects of internet functioning and the importance of internet as a fundamental human right. This discrepancy in perspectives highlights the disparities and challenges faced by countries in ensuring equal access to the internet.

Furthermore, following its withdrawal from the G8 in 2014, Russia has shifted towards aligning more with the Global South. Although specific reasons for this shift are not mentioned, this change in alignment could potentially impact Russia’s stance on global issues and its interactions with other countries in the future.

The discussions at the Internet Governance Forum offer a vital platform to address the crucial issues related to internet access and governance. By acknowledging and understanding the differing perspectives and challenges faced by countries in the Global South, there is an opportunity to bridge the digital divide and promote equal and inclusive access to the internet for individuals worldwide.

Moderator 1

The perspective of the global South is essential in discussions about fragmentation, particularly regarding technology and infrastructure issues. These countries often face challenges due to vulnerable infrastructure and poor internet governance, which can lead to frequent internet shutdowns. Such disruptions can have significant impacts on the economies, education systems, and overall development of these nations.

International cooperation is emphasised as a key approach to address these challenges. By promoting partnerships and collaborations, it becomes possible to ensure that all countries and regions have equal access to technological equipment and innovation. This is particularly important in bridging the existing digital divide between the global North and South.

Representatives from the global South tend to highlight the fundamental significance of the internet in discussions about fragmentation. They argue that access to the internet should be considered a basic human right, as it facilitates communication, access to information, and opportunities for socioeconomic development. Their perspective is influenced by the ongoing struggle to guarantee internet access for their populations, which is often hindered by various factors such as limited infrastructure, socioeconomic disparities, and inadequate internet governance frameworks.

It is interesting to note the stance of the Russian Federation in these discussions. Despite being geographically considered part of the global North, Russia has shown alignment with the perspectives of the global South. This shift in alignment became more noticeable after the country’s withdrawal from the G8 in 2014. It indicates that Russia is placing greater importance on addressing the challenges faced by the global South, particularly concerning fragmentation and internet governance issues.

In conclusion, the global South perspective holds significant weight in discussions about fragmentation, as these countries grapple with issues of infrastructure vulnerability and internet governance. International cooperation is crucial to ensure equitable access to technology and bridge the digital divide. The global South emphasises the essential nature of the internet as a basic human right, while the Russian Federation’s alignment with the global South highlights their shared concerns regarding fragmentation and the need for inclusive internet governance.

Roberto Zambrana

The internet was initially designed to connect the scientific and academic community, but it quickly expanded as people recognized the benefits and wanted to join for services like email and access to information. This early growth and widespread adoption of the internet marked a positive development.

However, as the internet continued to expand, issues started to emerge. One major concern was the security of the internet. With more users and an increase in the exchange of information online, there was a greater risk of cyber attacks and breaches. Governments also took actions that could be seen as leading to the fragmentation of the internet, potentially dividing it into smaller, controlled networks. These negative aspects raised concerns about the future of the internet.

Furthermore, the technical dimensions of the internet itself presented challenges. New protocols that altered the original architecture had the potential to lead to fragmentation. The introduction of the Hypertext Transfer Protocol (HTTP) was a significant advancement that facilitated the growth of the internet. However, changes like these could also contribute to fragmentation if not carefully managed.

Another factor that could contribute to fragmentation is the lack of actions to provide internet services to everyone. In many parts of the world, particularly in the Global South, over half of the population remains unconnected to the internet. This lack of accessibility and the failure of stakeholders to take action to address it hinder the expansion and unification of the internet.

Despite these challenges, there is recognition that maintaining respect for internet sovereignty is crucial. The internet should be treated as an entity deserving of respect, and there should be active exchange and adherence to the principles on which it was originally designed. This positive stance suggests that upholding internet sovereignty is necessary to preserve the integrity and functionality of the internet.

In conclusion, the internet’s original purpose was to connect the scientific and academic community, but it quickly evolved as people sought to benefit from its services. However, challenges such as security issues, potential fragmentation caused by technical changes and government actions, a lack of actions to provide internet services to all, and the need to maintain respect for internet sovereignty have emerged. These issues represent significant hurdles that need to be navigated to ensure the continued growth, accessibility, and integrity of the internet.

Milos Jovanovic

Internet fragmentation is a complex issue that takes on three forms: Technical, Governmental, and Commercial. Technical fragmentation concerns issues with the underlying infrastructure of the internet, such as inconsistent network protocols and incompatible standards. Governmental fragmentation involves internet access and information flow being restricted by governments through censorship and content filtering. Commercial fragmentation involves business practices that prevent certain users from creating and spreading information, such as targeted advertising algorithms.

To maintain a sovereign internet, it is important to focus on critical infrastructure, ensuring the stability, security, and resiliency of the internet’s underlying infrastructure. This includes protecting information channels through encryption techniques.

However, geopolitical issues and interests hinder the development of a minimum common framework to manage internet fragmentation. Different regions hold different perspectives and approaches to internet governance, leading to fragmented development and lack of consensus.

Emerging technologies like Artificial Intelligence (AI), Blockchain, automation, and 5G/6G networks also impact internet fragmentation. AI presents challenges in defining its boundaries and ethical use. The implementation of these technologies can either exacerbate or alleviate fragmentation, depending on how they are developed and deployed.

Internet fragmentation is expected to continue and deepen due to a multipolar world and shifting power dynamics. Challenges exist in parts of the world, such as Africa, that are less connected. Bridging the digital divide and ensuring equitable access can help mitigate the negative effects of fragmentation and reduce inequalities.

In conclusion, addressing technical, governmental, and commercial aspects of internet fragmentation, ensuring critical infrastructure, considering the impact of emerging technologies, and promoting global cooperation are necessary to manage and reduce the negative impacts of fragmentation.

Olga Makarova

The analysis delves into two main topics: technological revolutions and internet fragmentation. It asserts that these revolutions follow a cyclical pattern that can be predicted. The cycle begins with an eruption and frenzy, characterized by rapid growth and excitement surrounding a new technological advancement. This is followed by a crash, where the initial enthusiasm subsides, leading to a decline in the market. Regulatory intervention then comes into play, as authorities step in to establish rules and guidelines to govern the technology. Finally, the revolution reaches its ultimate maturity, where the technology becomes an integral part of society. Currently, the analysis posits that we are in the midst of the fifth technological revolution, referred to as the information and telecommunication age.

Moving on to internet fragmentation, the analysis suggests that this phenomenon can occur due to a combination of technological, political, and economic factors. The internet is described as a collection of interconnected but autonomous systems. Fragmentation, as the analysis points out, lacks a clear-cut definition, making it a concept that is difficult to pin down. It argues that fragmentation may manifest in various forms, leading to potential consequences for connectivity and access.

Furthermore, the analysis proposes the idea of employing mathematical models to gain an understanding of and predict internet fragmentation. It highlights an older model from 1997 that quantifies fragmentation in terms of distribution, intentionality, impact, and nature. The analysis expresses optimism about the potential usefulness of mathematical models in comprehending the complexities of internet fragmentation.

In conclusion, the analysis provides valuable insights into the predictable cycle of technological revolutions, specifically focusing on the current information and telecommunication age. It also explores the potential for internet fragmentation, noting its potential consequences on connectivity and access. Additionally, the proposal to employ mathematical models as a tool for understanding and predicting internet fragmentation adds another layer of interest to the analysis. Overall, it offers a comprehensive overview of these topics, shedding light on past trends and potential future developments.

Otieno Barrack

The analysis explores the topic of internet governance, with a particular focus on its relevance in the Global South. It highlights the fact that many nations in the Global South are utilising systems and solutions that were largely designed in the Global North. This reliance on infrastructure not specifically tailored to their needs has resulted in a number of issues, such as internet shutdowns due to weak infrastructure.

The rise of internet shutdowns in the Global South is a growing concern, as they have a significant impact on local internet economies. This emphasises the need for internet governance to be applicable at a local level, despite its global public good nature. Design principles specific to internet infrastructure in the Global South need to be considered to ensure effectiveness and reliability.

Investment in the correct technological competence is also crucial. The private sector must invest in the appropriate technological capabilities to prevent infrastructure compromise. Poorly executed investments in technological competence can result in significant problems and hinder the development and stability of internet systems.

Additionally, the government plays a key role in creating a level playing field for all actors in internet governance. Their involvement ensures that the interests and needs of various stakeholders are taken into account. By fostering a fair and inclusive environment, the government can help promote the stability and growth of internet systems.

The analysis also highlights the negative effects of internet shutdowns on both local and global internet economies. Studies have shown that these shutdowns incur significant costs that extend beyond the immediate disruption of internet access. This further underscores the importance of addressing internet governance issues and safeguarding the stability and accessibility of internet systems.

In conclusion, the analysis emphasises the importance of relevant and applicable internet governance at a local level in the Global South. It stresses the need to consider region-specific design principles, as well as the significance of private sector investment in the appropriate technological competence. The role of the government in creating a fair and inclusive environment for all actors in internet governance is also highlighted. Lastly, the detrimental impact of internet shutdowns on local and global internet economies serves as a compelling argument for addressing these issues and ensuring the stability and accessibility of internet systems.

Speakers

&

’Dr

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Moderator

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Moderator

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Olga

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Otieno

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Roberto

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Searching for Standards: The Global Competition to Govern AI | IGF 2023

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Michael Karanicolas

During a session on AI governance, organized by the School of Law and the School of Engineering at UCLA, the Yale Information Society Project, and the Georgetown Institute for Technology, Law and Policy, Michael Karanicolas hosted a discussion on the development of new regulatory trends around the world. The focus was on major regulatory blocks such as China, the US, and the EU, and their influence on AI development globally.

The session aimed to explore the tension between the rule-making within these major regulatory blocks and the impacts of AI outside of this privileged minority. It recognized their dominant position and sought to understand their global influence in shaping AI governance. The discussion highlighted the need to recognize the power dynamics at play and ensure that the regulatory decisions made within these blocks do not ignore the wider issues and potential negative ramifications for AI development on a global scale.

Michael Karanicolas encouraged interactive participation from the audience, inviting comments and engagement from all present. He stressed the importance of active participation over passive listening, fostering an environment that encouraged inclusive and thoughtful discussions.

The speakers also delved into the globalised nature of AI and the challenges posed by national governments in regulating it. As AI consists of data resources, software programs, networks, and computing devices, it operates within globalised markets. The internet has enabled the rapid distribution of applications and data resources, making it difficult for national governments to control and regulate the development of AI effectively. The session emphasised that national governments alone cannot solve the challenges and regulations of AI, calling for partnerships and collaborative efforts to address the global nature of AI governance.

Another topic of discussion revolved around the enforcement of intellectual property (IP) rights and privacy rights in the online world. It was noted that the enforcement of IP rights online is significantly stronger compared to the enforcement of privacy rights. This discrepancy is seen as a result of the early prioritisation of addressing harms related to IP infringement, while privacy rights were not given the same level of attention in regulatory efforts. The session highlighted the need to be deliberate and careful in selecting how harms are understood and prioritised in current regulatory efforts to ensure a balance between different aspects of AI governance.

Engagement, mutual learning, and sharing of best practices were seen as crucial in the field of AI regulation. The session emphasised the benefits of these collaborative approaches, which enable regulators to stay updated on the latest developments and challenges in AI governance. It also emphasised the importance of factoring local contexts into regulatory processes. A one-size-fits-all approach, where countries simply adopt an EU or American model without considering their unique circumstances, was deemed problematic. It was concluded that for effective AI regulation, it is essential to develop regulatory structures that fit the purpose and are sensitive to the local context.

In conclusion, the session on AI governance hosted by Michael Karanicolas shed light on the influence of major regulatory blocks on AI development globally. It emphasised the need for inclusive and participatory approaches in AI governance and highlighted the challenges posed by national governments in regulating AI. The session also underscored the need for a balanced approach to prioritise different aspects of AI governance, including intellectual property rights and privacy rights. The importance of engagement, mutual learning, and the consideration of local contexts in regulatory processes were also highlighted.

Tomiwa Ilori

AI governance in Africa is still in its infancy, with at least 466 policy and governance items referred to in the African region. However, there is currently no major treaty, law, or standard specifically addressing AI governance in Africa. Despite this, some countries in Africa have already taken steps to develop their own national AI policies. For instance, countries like Mauritius, Kenya, and Egypt have established their own AI policies, indicating the growing interest in AI governance among African nations.

Interest in AI governance is not limited to governments alone. Various stakeholders in Africa, including multilateral organizations, publicly funded research institutions, academia, and the private sector, are increasingly recognizing the importance of AI governance. This indicates a collective recognition of the need to regulate and guide the development and use of artificial intelligence within the region. In fact, the Kenyan government has expressed its intention to pass a law aimed at regulating AI systems, further demonstrating the commitment towards responsible AI governance in Africa.

However, the region often relies on importing standards rather than actively participating in the design and development of these standards. This makes African nations more vulnerable and susceptible to becoming pawns or testing grounds for potentially inadequate AI governance attempts. This highlights the need for African nations to actively engage in the process of shaping AI standards rather than merely adapting to standards set by external entities.

On a positive note, smaller nations in Africa have the potential to make a significant impact by strategically collaborating with like-minded initiatives. International politics often stifle the boldness of smaller nations, but when it comes to AI governance, smaller nations can leverage partnerships and collaborations to amplify their voices and push for responsible AI practices. By working together with others who share similar goals and intended results, the journey towards achieving effective AI governance in Africa could be expedited.

In conclusion, AI governance in Africa is still in its early stages, but the interest and efforts to establish responsible AI policies and regulations are steadily growing. While there is currently no major treaty or law specifically addressing AI governance in Africa, countries like Mauritius, Kenya, and Egypt have already taken steps to develop their own national AI policies. Moreover, various stakeholders, including governments, multilateral organizations, academia, and the private sector, are recognizing the significance of AI governance in Africa. Despite the challenges that smaller nations in Africa may face, strategic collaborations and partnerships can empower them to actively shape the future of AI governance in the region.

Carlos Affonso Souza

In Latin America, several countries, including Argentina, Brazil, Colombia, Peru, and Mexico, are actively engaging in discussions and actions related to the governance and regulation of Artificial Intelligence (AI). This reflects a growing recognition of the need to address the ethical implications and potential risks associated with AI technology. The process of implementing AI regulation typically involves three stages: the establishment of broad ethical principles, the development of national strategies, and the enactment of hard laws.

However, different countries in Latin America are at varying stages of this regulatory process, which is influenced by their unique priorities, approaches, and long-term visions. Each country has its specific perspective on how AI will drive economic, political, and cultural changes within society. Accordingly, they are implementing national strategies and specific regulations through diverse mechanisms.

One of the challenges in regulating AI in the majority world lies in the nature of the technology itself. AI can often be invisible and intangible, making it difficult to grasp and regulate effectively. This creates a need for countries in the majority world to develop their own regulations and governance frameworks for AI.

Moreover, these countries primarily serve as users of AI applications rather than developers, making it even more crucial to establish regulations that address not only the creation but also the use of AI applications. This highlights the importance of ensuring that AI technologies are used ethically and responsibly, considering the potential impact on individuals and society.

Drawing from the experience of internet regulation, which has dealt with issues such as copyright, freedom of expression, and personal data protection, can provide valuable insights when considering AI regulation. The development of personal data protection laws and decisions on platform liability are also likely to significantly influence the shape of AI regulation.

Understanding the different types of AI and the nature of the damages they can cause is essential for effective regulation. It is argued that AI should not be viewed as purely autonomous or dumb but rather as a tool that can cause both harm and profit. Algorithmic decisions are not made autonomously or unawarely but rather reflect biases in design or fulfill their intended functions.

Countries’ motivations for regulating AI vary. Some view it as a status symbol of being future-oriented, while others believe it is important to learn from regulation efforts abroad and develop innovative solutions tailored to their own contexts. There is a tendency to adopt European solutions for AI regulation, even if they may not function optimally. This adoption is driven by the desire to demonstrate that efforts are being made towards regulating AI.

In conclusion, Latin American countries are actively engaging in discussions and actions to regulate AI, recognizing the need to address its ethical implications and potential risks. The implementation of AI regulation involves multiple stages, and countries are at different phases of this process. Challenges arise due to the intangible nature of AI, which requires countries to create their own regulations. The use of AI applications, as well as the type and nature of damages caused by AI, are important considerations for regulation. The experience of internet regulation can provide useful insights for AI regulation. The motivations for regulating AI vary among countries, and there is a tendency to adopt European solutions. Despite the shortcomings of these solutions, countries still adopt them to show progress in AI regulation.

Irakli Khodeli

The UNESCO recommendation on AI ethics has become a critical guide for global AI governance. It was adopted two years ago by 193 member states, demonstrating its widespread acceptance and importance. The principles put forward by UNESCO are firmly rooted in fundamental values such as human rights, human dignity, diversity, environmental sustainability, and peaceful societies. These principles aim to provide a solid ethical foundation for the development and deployment of AI technologies.

To ensure the practical application of these principles, UNESCO has operationalized them into 11 different policy contexts. This highlights the organization’s commitment to bridging the gap between theoretical principles and practical implementation. By providing specific policy contexts, UNESCO offers concrete guidance for governments and other stakeholders to incorporate AI ethics into their decision-making processes.

One of the key arguments put forth by UNESCO is that AI governance should be grounded in gender equality and environmental sustainability. The organization believes that these two aspects are often overlooked in global discussions on AI ethics and governance. By highlighting the need to disassociate gender discussions from general discrimination discussions and emphasising environmental sustainability, UNESCO aims to bring attention to these crucial issues.

Furthermore, UNESCO emphasises the significant risks posed by AI, ranging from benign to catastrophic harms. The organization argues that these risks are closely intertwined with the pillars of the United Nations, such as sustainable development, human rights, gender equality, and peace. Therefore, global governance of AI is deemed critical to avoid jeopardizing other multilateral priorities.

While global governance is essential, UNESCO also recognises the significant role of national governments in AI governance. Successful regulation and implementation of AI policies ultimately occur at the national level. It is the responsibility of national governments to establish the necessary institutions and laws to govern AI technologies effectively. This highlights the importance of collaboration between national governments and international organisations like UNESCO.

In terms of regulation, it is evident that successful regulation of any technology, including AI, requires a multi-layered approach. Regulatory frameworks must exist at different levels – global, regional, national, and even sub-national – to ensure comprehensive and effective governance. The ongoing conversation at the United Nations revolves around determining the appropriate regulatory mechanisms for AI. Regional organisations such as the European Union, African Union, and ASEAN already play significant roles in AI regulation. Meanwhile, countries themselves are indispensable in enforcing regulatory mechanisms at the national level.

To achieve coordination and compatibility between different layers of regulation, various stakeholders, including the UN, European Union, African Union, OECD, and ASEAN, are mentioned as necessary participants. The creation of a global governance mechanism is advocated to ensure interoperability and coordination among different levels of regulation, ultimately facilitating effective AI governance on a global scale.

Additionally, bioethics is highlighted as a concrete example of how a multi-level governance model can function successfully. UNESCO’s Universal Declaration on Bioethics and Human Rights, along with the Council of Europe’s Oviedo Convention, serve as global and regional governance examples, respectively. These principles are then translated into binding regulations at the country level, further supporting the notion that a multi-level approach can be effective in governing complex issues like AI ethics.

In conclusion, the UNESCO recommendation on AI ethics provides crucial guidance for global AI governance. By grounding AI ethics in fundamental values, providing specific policy contexts, and emphasising the importance of gender equality and environmental sustainability, UNESCO aims to ensure that AI technologies are developed and deployed responsibly. This requires collaboration between international organisations, national governments, and other stakeholders to establish regulatory frameworks at different levels. Ultimately, a global governance mechanism is advocated to coordinate and ensure compatibility between these levels of regulation.

Kyoko Yoshinaga

Japan takes a soft law approach to AI governance, using non-binding international frameworks and principles for AI R&D. These soft laws guide Japanese companies in developing their own AI policies, ensuring flexibility and adaptation. Additionally, Japan amends sector-specific hard laws to enhance transparency and fairness in the AI industry. Companies like Sony and Fujitsu have already developed AI policies, focusing on responsible AI as part of corporate social responsibility and ESG practices. Publicly accessible AI policies are encouraged to promote transparency and accountability. Japan also draws on existing frameworks, such as the Information Security Governance Policy Framework, to establish robust AI governance. Each government should tailor AI regulations to their own context, considering factors like corporate culture and technology level. Hard laws on AI risks may be dangerous due to their varying nature, and personal data protection laws are essential for addressing privacy concerns with AI.

Simon Chesterman

The analysis of the given text reveals several key points regarding AI regulation and governance. Firstly, it is highlighted that jurisdictions are wary of both over-regulating and under-regulating AI. Over-regulation, especially in smaller jurisdictions like Singapore, might cause tech companies to opt for innovation elsewhere. On the other hand, under-regulation may expose citizens to unforeseen risks. This underscores the need for finding the right balance in AI regulation.

Secondly, it is argued that a new set of rules is not necessary to regulate AI. The text suggests that existing laws are capable of effectively governing most AI use cases. However, the real challenge lies in the application of these existing rules to new and emerging use cases of AI. Despite this challenge, the prevailing sentiment is positive towards the effectiveness of current regulations in governing AI.

Thirdly, Singapore’s approach to AI governance is highlighted. The focus of Singapore’s AI governance framework is on human-centrality and transparency. Rather than creating new laws, Singapore has made adjustments to existing ones to accommodate AI, such as changing the Road Traffic Act to allow for the use of autonomous vehicles. This approach reflects Singapore’s commitment to ensuring human-centrality and transparency in AI governance.

Additionally, it is mentioned that the notion of AI not being biased is covered under anti-discrimination laws. This highlights the importance of ensuring that AI systems are not prejudiced or discriminatory, in alignment with existing laws.

The text also emphasises the need for companies to police themselves regarding AI regulations. Singapore has released a tool called AI Verify, which assists organizations in self-regulating their AI standards and evaluating if further improvements are needed. This self-regulation approach is viewed positively, highlighting the responsibility of companies in ensuring ethical and compliant AI practices.

Furthermore, the text acknowledges that smaller jurisdictions face challenges when it comes to AI regulation. These challenges include deciding when and how to regulate and addressing the concentration of power in private hands. These issues reflect the delicate balance that smaller jurisdictions must navigate to effectively regulate AI.

The influence of Western technology companies on AI regulations is another notable observation. The principles of AI regulation can be traced back to these companies, and public awareness and concern about the risks of AI have been triggered by events like the Cambridge Analytica scandal. This implies that the regulations of AI are being influenced by the practices and actions of primarily Western technology companies.

Regulatory sandboxes, particularly in the fintech sector, are highlighted as a useful technique for fostering innovation. The Monetary Authority of Singapore has utilized regulatory sandboxes to reduce risks and enable testing of new use cases for AI in the fintech sector.

In terms of balancing regulation and innovation, the text emphasizes the need for a careful approach. The Personal Data Protection Act in Singapore aims to strike a balance between users’ rights and the needs of businesses. This underscores the importance of avoiding excessive regulation that may drive innovation elsewhere.

Furthermore, the responsibility for the output generated by AI systems is mentioned. It is emphasized that accountability must be taken for the outcomes and impact of AI systems. This aligns with the broader goal of achieving peace, justice, and strong institutions.

In conclusion, the text highlights various aspects of AI regulation and governance. The need to strike a balance between over-regulation and under-regulation, the effectiveness of existing laws in governing AI, and the importance of human-centrality and transparency in AI governance are key points. It is also noted that smaller jurisdictions face challenges in AI regulation, and the influence of Western technology companies is evident. Regulatory sandboxes are seen as a useful tool, and the responsibility for the output of AI systems is emphasized. Overall, the analysis provides valuable insights into the complex landscape of AI regulation and governance.

Audience

During the discussion on regulating artificial intelligence (AI), several key challenges and considerations were brought forward. One of the main challenges highlighted was the need to strike a balance in regulating generative AI, which has caused disruptive effects. This task proves to be challenging due to the complex nature of generative AI and its potential impact on multiple sectors. It was noted that the national AI policy of Pakistan, for example, is still in the draft stage and is open for input from various stakeholders.

Another crucial consideration is the measurement of risks associated with AI usage. The speaker from the Australian National Science Agency emphasized the importance of assessing the risks and trade-offs involved in AI applications. There was a call for an international research alliance to explore how to effectively measure these risks. This approach aims to guide policymakers and regulators in making informed decisions about the use of AI.

The discussion also explored the need for context-based trade-offs in AI usage. One example provided was the case of face recognition for blind people. While blind individuals desire the same level of facial recognition ability as sighted individuals, legislation that inhibits the development of face recognition for blind people due to associated risks was mentioned. This highlights the need to carefully consider the trade-offs and context-specific implications of AI applications.

The global nature of AI was another topic of concern. It was pointed out that AI applications and data can easily be distributed globally through the internet, making it difficult for national governments alone to regulate AI effectively. This observation indicates the necessity of international collaboration and partnerships in regulating AI in order to mitigate any potential risks and ensure responsible use.

The impact of jurisdiction size on regulation was also discussed. The example of Singapore’s small jurisdiction size potentially driving businesses away due to regulations was mentioned. However, it was suggested that Singapore’s successful publicly-owned companies could serve as testing grounds for regulation implementation. This would allow for experimentation and learning about what works and what consequences may arise.

Data governance and standard-setting bodies were also acknowledged as influential in AI regulation. Trade associations and private sector standard-setting bodies were highlighted for their significant role. However, it was noted that these structures can sometimes work at cross-purposes and compete, potentially creating conflicts. This calls for a careful consideration of the interaction between different bodies involved in norm-setting processes.

The issue of data granularity in the global South was raised, highlighting a potential risk for AI. It was noted that the global South might not have the same fine granularity of data available as the global North, which may lead to risks in the application of AI. This disparity emphasizes the need to address power dynamics between the global North and South to ensure a fair and equitable AI practice.

Several arguments were made regarding the role of the private sector in AI regulation and standard-setting. The host called for private sector participation in the discussion, recognizing the importance of their involvement. However, concerns were expressed about potential discrimination in AI systems that learn from massive data. The shift in AI learning from algorithms in the past to massive data learning today raises concerns about potential biases and discrimination against groups that do not produce a lot of data for AI to learn from.

The speakers also emphasized the importance of multi-stakeholder engagement in regulation and standard-setting. Meaningful multi-stakeholder processes were deemed necessary for crafting effective standards and regulations for AI. This approach promotes inclusivity and ensures that various perspectives and interests are considered.

Current models of AI regulation were criticized for being inadequate, with companies sorting themselves into risk levels without comprehensive assessment. Such models were seen as box-ticking exercises rather than effective regulation measures. This critique underscores the need for improved risk assessment approaches that take into account the nuanced and evolving nature of AI technologies.

A rights-based approach focused on property rights was argued to be crucial in AI regulation. New technologies, such as AI, have created new forms of property, raising discussions around ownership and control of data. Strict definitions of digital property rights were cautioned against, as they might stifle innovation. Striking a balance between protecting property rights and fostering a dynamic AI ecosystem is essential.

The importance of understanding and measuring the impact of AI within different contexts was highlighted. The need to define ways to measure AI compliance, performance, and trust in AI systems was emphasized. It was suggested that pre-normative standards could provide a helpful framework but acknowledged the lengthy time frame required for their development and establishment as standards.

Collaboration with industry was deemed essential in the regulation of AI. Industry was seen as a valuable source of resources, case studies, and knowledge. The mutual benefit between academia and industry in research and development efforts was acknowledged, emphasizing the significance of partnerships for effective regulation and innovation.

In conclusion, the discussion on regulating AI delved into various challenges and considerations. Striking a balance in the regulation of generative AI, measuring risks associated with AI usage, addressing context-specific trade-offs, and promoting multi-stakeholder engagement were key points raised. The impact of data granularity, power dynamics, and the role of the private sector were also highlighted. Observations were made regarding the inadequacy of current AI regulation models, the need for a rights-based approach focused on property rights, and the importance of understanding and measuring the impact of AI within different contexts. Collaboration with industry was emphasized as crucial, and various arguments and evidence were presented throughout the discussion to support these points.

Courtney Radsch

In the United States, there is a strong focus on developing frameworks for the governance and regulation of artificial intelligence (AI). The White House Office of Science and Technology Policy is taking steps to create a blueprint for an AI Bill of Rights, which aims to establish guidelines and protections for the responsible use of AI. The National AI Commission Act is another initiative that seeks to promote responsible AI regulation across various government agencies.

Furthermore, several states in the US have already implemented AI legislation to address the growing impact of AI in various sectors. This reflects a recognition of the need to regulate and govern AI technologies to ensure ethical and responsible practices.

However, some argue that the current AI governance efforts are not adequately addressing the issue of market power held by a small number of tech giants, namely Meta (formerly Facebook), Google, and Amazon. These companies dominate the AI foundation models and utilize aggressive tactics to acquire and control independent AI firms. This dominance extends to key cloud computing platforms, leading to self-preference of their own AI models. Critics believe that the current market structure needs to be reshaped to eliminate anti-competitive practices and foster a more balanced and competitive environment.

Another important aspect highlighted in the discussion is the need for AI governance to address the individual components of AI. This includes factors like data, computational power, software applications, and cloud computing. Current debates on AI governance mostly focus on preventing harm and exploitation, but fail to consider these integral parts of AI systems.

The technical standards set by tech communities also come under scrutiny. While standards like HTTP, HTTPS, and robot TXT have been established, concerns have been raised regarding the accumulation of rights-protected data by big tech companies without appropriate compensation. These actions have significant political and economic implications, impacting other industries and limiting the overall fairness of the system. It is argued that a more diverse representation in the tech community is needed to neutralize big tech’s unfair data advantage.

The notion of unfettered innovation is challenged, as some argue that it may not necessarily lead to positive outcomes. The regulation of AI should encompass a broader set of policy interventions that prioritize the public interest. A risk-based approach to regulation is deemed insufficient to address the complex issues associated with AI.

The importance of data is emphasized, highlighting that it extends beyond individual user data, encompassing environmental and sensor data as well. The control over and exploitation of such valuable data by larger firms requires careful consideration and regulation.

A notable challenge highlighted is the lack of oversight of powerful companies, particularly for non-EU researchers due to underfunding. This raises concerns about the suppression or burying of risky research findings by companies conducting their own risk assessments. It suggests the need for independent oversight and accountability mechanisms to ensure that substantial risks associated with AI are properly addressed.

In conclusion, the governance and regulation of AI in the United States are gaining momentum, with initiatives such as the development of an AI Bill of Rights and state-level legislation. However, there are concerns regarding the market power of tech giants, the need to focus on individual components of AI, the political and economic implications of technical standards, the lack of diversity in the tech community, and the challenges of overseeing powerful companies. These issues highlight the complexity of developing effective AI governance frameworks that strike a balance between promoting innovation, protecting the public interest, and ensuring responsible and ethical AI practices.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Socially, Economically, Environmentally Responsible Campuses | IGF 2023 Open Forum #159

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Moderator – Hiroshi Esaki

The analysis covers a wide range of topics related to smart and sustainable solutions, the ethical use of technology, green designs, energy efficiency, the role of the younger generation in technological change, government-initiated smart cities, multi-stakeholder approaches, data ownership, and the future of education infrastructure. The overall sentiment of the analysis is positive, highlighting the potential benefits and necessary actions in each area.

One of the key arguments is the integration of smart and sustainable solutions in universities, which play a crucial role in shaping the minds of the next generation. The analysis emphasizes the need for universities to embrace the digital revolution and create campuses that are both state-of-the-art and environmentally friendly.

The importance of green designs and retrofitting existing structures to enhance energy efficiency is also highlighted. The panel stresses the significance of adopting net-zero footprint strategies and aligning with global standards, focusing on making existing buildings more energy-efficient rather than solely focusing on new construction.

Another area of focus is the G20 Global Smart Alliance, which aims to establish global norms for the ethical and responsible use of smart technologies in cities. The analysis expresses support for the alliance’s work and emphasizes the importance of setting global standards to ensure ethical use of technology for sustainable development.

The analysis also discusses the expansion efforts of the Global Smart City Alliance, which includes more than 36 pioneer cities globally. It highlights the importance of collaboration and knowledge sharing among cities to address common challenges and promote sustainable development.

The role of the younger generation in driving technological change is also emphasized. The analysis recognizes the power and potential of younger people in shaping the future and emphasizes the importance of investing in their education and empowerment.

There is also mention of the view that government-initiated smart cities can be a mistake, arguing for a multi-stakeholder, agile approach involving academia, industry, and government support.

The importance of data ownership is discussed, with a focus on individuals having ownership of their own data. The analysis highlights the need for discussions on data privacy and usage to ensure ethical and responsible data practices.

In terms of the future of education infrastructure, the analysis expresses optimism and discusses the role of advancing technologies in shaping educational settings. It mentions the Smart Campus Blueprint as an initiative to integrate technology into educational environments.

Overall, the analysis provides valuable insights into the various topics discussed. It emphasizes the significance of integrating smart and sustainable solutions, establishing global norms for responsible technology use, expanding smart city alliances, retrofitting existing structures, empowering the younger generation, adopting multi-stakeholder approaches, prioritizing data ownership, and embracing technology in education. The analysis encourages individuals to actively contribute to these efforts by joining initiatives such as the G20 Global Smart Alliance Network.

Audience

During the discussion, Taro emphasised the significance of STEM education, encompassing the fields of science, technology, engineering, and medicine. He stressed the need to prioritise these disciplines in the education system as they play a crucial role in driving innovation, economic growth, and societal development.

Taro argued that STEM education offers students a comprehensive understanding of the world and equips them with the necessary skills to navigate challenges in the rapidly advancing technological landscape. By fostering an interest and aptitude for STEM subjects, students can develop critical thinking, problem-solving, and analytical skills highly sought after in today’s workforce.

Supporting his argument, Taro cited statistics highlighting the increasing demand for STEM professionals in the job market, as well as the higher salaries typically associated with careers in these fields. He also referred to studies demonstrating the positive impact of early exposure to STEM education on students’ academic performance, engagement, and career prospects.

Encouraging active participation, Taro invited the audience to pose relevant questions, creating an inclusive environment where different perspectives could be shared and discussed. This facilitated a deeper exploration of the topic and a more holistic conversation.

In summary, Taro’s emphasis on STEM education stems from the belief that it is crucial for preparing future generations to thrive in an increasingly technology-driven world. Through a focus on science, technology, engineering, and medicine, students can acquire the skills and knowledge necessary to contribute to innovation, solve complex problems, and drive societal progress. The audience was encouraged to engage in the conversation by asking thought-provoking questions, leading to a more comprehensive understanding of the topic at hand.

Corey Glickman

The analysis focused on various aspects of sustainable urban development and energy efficiency in India and the United States. It highlighted the need for promoting equitable wellness and resilience in urban landscapes, acknowledging that smart monitors and controls in transport, buildings, environment, life, events, infrastructure, and utilities can enable communities to transform the urban landscape. The vision for a zero-carbon built environment includes the goal of achieving equitable wellness and resilience for all.

Decarbonization efforts were seen as requiring democratized action and support from all stakeholders to succeed. It was argued that enforced decarbonization standards at the government level without the involvement of the community, experts, learning institutions, and businesses can lead to failure. The transformation towards decarbonization takes place when there is participation from various stakeholders, ensuring that everyone’s needs and perspectives are considered.

The analysis expressed concern about the increase in building construction in India, which has led to a significant rise in building energy use. With India poised to become the fifth-largest economy in the world, the construction of new buildings at a rate of 8% annually has contributed to the escalating energy demands. However, it was also recognized that India has inherent advantages for building energy efficiency. These include a strong tradition of passively cooled buildings, a wide occupant tolerance to heat, a ready supply of local sustainable construction materials, inexpensive labor and craft costs, and careful use of resources.

Collaboration between the United States and India was emphasized, particularly in the field of building energy research and development. The U.S.-India joint center for building energy research and development, called CBERD, was highlighted as an example of such collaboration. It aims to develop building technologies that improve energy efficiency, comfort, and health safety. Through CBERD, significant collaborations between Indian and U.S. scientists have taken place, resulting in the development of nine new technologies, more than 100 peer-reviewed publications, and fostering mutual respect.

One notable aspect of the collaboration between the United States and India is the development of tools and resources for energy-efficient building design. These tools and guides aim to provide best practices for designing low-energy buildings and are specifically suited to the cultural, climatic, and construction context of India. They serve as valuable resources for the public and contribute to the advancement of sustainable building practices in the country.

The analysis also discussed the importance of digital transformation and leadership alignment in sustainable city development. Partnerships between the University of Tokyo and Microsoft were highlighted as contributors to this transformation. The adoption of technologies like digital twins and IoT devices was noted since these technologies already exist and can be utilized in the process of digital transformation. Furthermore, it was emphasized that alignment between visionary leadership and the actual implementers of policies is crucial for successful implementation.

The analysis advocated for using existing policies as a starting point for building sustainable urban environments, suggesting that the Green Sustainability City Alliance is working on embodied carbon for existing buildings and sustainable procurement as initial policies. However, it acknowledged that issues can arise due to complexities in zoning and challenges from local and national governance.

Localization was presented as an important factor when implementing policies related to sustainable urban development. It was acknowledged that what works in one city may not necessarily translate to another, and additional actions may be required upstream or downstream for policies to make sense in different contexts.

The discussion highlighted the positive role that policy discussion and collaboration can play in accelerating progress towards sustainable urban development. It was noted that policy leaders often have open attitudes towards discussions and are willing to share their networks, facilitating collaboration and the exchange of ideas.

Finally, the analysis acknowledged the significant role that global IT companies, particularly Microsoft, and other hyperscalers, will play in shaping the future of smart buildings and campuses. These global IT companies are viewed as instrumental in establishing the digital backbone necessary for sustainability and efficiency. The analysis also identified a potential winning formula for smart city development, which involves collaboration between university-based academic research, major IT service providers, and policymakers. This combination has been observed to be effective, particularly when implementing projects that involve academic-led investigations in controlled city areas or airports, supported by major IT service providers and policymakers.

Overall, the analysis offered valuable insights into the various aspects and challenges of sustainable urban development and energy efficiency in India and the United States. It emphasized the need for holistic approaches, stakeholder involvement, collaboration, and the leveraging of existing resources to achieve sustainable and resilient urban environments.

Hiroshi Esaki

The analysis highlights the potential of digital technology in enhancing energy efficiency, particularly through the use of cloud computing. It suggests that adopting digital technologies can result in over 80% energy savings. A footprints analysis reveals that following the EP100 plan can increase renewable energy usage to 25-30%. Therefore, digital technology can improve energy efficiency by up to 50%.

The analysis also emphasizes the positive impact of cloud computing and sharing economy in reducing energy consumption. Migrating from on-premise computers to data centers can lead to a 30-40% energy cut, thanks to high-performance HVAC systems. Additionally, cloud computing can save 70-80% energy through sharing economy.

Digital twin technology is highlighted as a tool for optimizing energy usage in system operation. A 12-year-old implementation resulted in a 31% energy productivity improvement, and current digital twin technologies can further reduce energy use.

Redesigning physical systems using digital technologies can significantly reduce carbon footprint. Comparative cost analysis shows improved energy productivity when digital transportation replaces physical transportation.

Collaboration between academia and industry is essential for effective decarbonization strategies. An example is provided where Tokyo University achieved over 30% decrease in energy consumption through collaboration. Young students working with seniors are seen as crucial for the future.

Hands-on experience and technology usage are emphasized, not just as theoretical study tools. A visit to Microsoft’s Redmond headquarters illustrates the importance of a concrete touch in the system.

Criticism is raised towards the government-initiated ‘smart city’ approach, advocating for a multi-stakeholder action involving academia and industry.

The concept of democratization is discussed, particularly in relation to data privacy and ownership. It emphasizes the need for a multi-stakeholder discussion.

In conclusion, digital technology has transformative potential in improving energy efficiency and reducing energy consumption. Cloud computing, sharing economy, and digital twin technology are key drivers. Collaboration between academia and industry is crucial, and hands-on experience and technology usage are essential. The government-led ‘smart city’ approach is criticized, and democratization in data privacy and ownership is highlighted. Policymakers, industry professionals, and researchers can benefit from these insights for a sustainable future.

Masami Ishiyama

Microsoft is leading the way in sustainability by adopting a comprehensive approach. By 2030, they aim to achieve carbon negativity, water positivity, and zero waste. This ambitious goal demonstrates their commitment to reducing their environmental impact and addressing sustainability challenges across their entire company. Microsoft is actively involved in various sustainability initiatives, including the G20 Global Smart City Alliance project, showing their dedication to collaborating with other organizations to drive sustainable change on a global scale.

Data and technology play a crucial role in Microsoft’s sustainability strategy. They have developed innovative solutions that leverage data analytics and technology to optimize energy usage and reduce their environmental footprint. For example, their smart building solution, in partnership with Ionic and equipped with Power BI, Azure IoT, and Dynamics 365, has shown a 6-10% reduction in annual energy consumption. Microsoft also utilizes one of the world’s largest corporate real estate data stores to optimize operations and save money, highlighting the value of data in driving sustainability efforts. Their operational platforms, Data and BI, along with Azure Digital Twin, contribute to enhancing sustainability by providing efficient data management and processing capabilities.

Microsoft recognizes the importance of data ownership and privacy in the digital age. They are committed to safeguarding customer permissions and protecting their data against potential threats. By empowering customers to have control over their data, Microsoft ensures transparency and supports their data privacy concerns. This strong emphasis on data ownership aligns with the principles of industry innovation and strong institutions outlined in the Sustainable Development Goals (SDGs).

The implementation of effective smart campus strategies exemplifies Microsoft’s commitment to sustainability in both their internal operations and external collaborations. For instance, their partnership with Temple University has resulted in optimizing energy efficiency and reducing resource usage. Microsoft’s smart campus strategy involves streamlining processes, identifying clear Internet of Things (IoT) use cases, managing construction schedules, and maintaining accurate floor plans. By prioritizing energy optimization and resource management, Microsoft demonstrates their dedication to creating sustainable campuses and positively impacting the environment.

Furthermore, Microsoft provides software solutions, such as Azure Digital Twin, that have the potential to reduce electricity consumption. By utilizing this technology in buildings, energy efficiency can be improved, contributing to the goal of affordable and clean energy outlined in the SDGs.

Data ownership and governance concerns are major obstacles in today’s digital landscape. Microsoft recognizes the growing importance of generative AI and data and supports the need for clear data ownership and controls. They assert that data ownership belongs to the customer and that a multi-stakeholder decision-making process is crucial in addressing data ownership concerns. This stance aligns with the principles of peace, justice, and strong institutions highlighted in the SDGs.

Overall, Microsoft’s comprehensive sustainability approach is demonstrated through their goals of carbon negativity, water positivity, and zero waste by 2030. Their involvement in global sustainability initiatives, use of data and technology to optimize energy usage, commitment to data ownership and privacy, successful implementation of smart campus strategies, and software offerings for reducing electricity consumption all showcase their dedication to sustainability. Microsoft’s approach not only aligns with the SDGs but also highlights their commitment to responsible corporate citizenship and driving positive change.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

RITEC: Prioritizing Child Well-Being in Digital Design | IGF 2023 Open Forum #52

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Audience

During the discussion, different concerns and questions were raised regarding various aspects of children’s digital life. One of the concerns highlighted was the issue of tokenism and the need for genuine child participation. The Belgian Safer Internet Center, which operates under the InSafe umbrella, was mentioned as actively working towards achieving a true representational group of young people. The sentiment expressed was one of concern, aiming to avoid using children as tokens and instead promoting their meaningful involvement in decision-making processes.

Another concern raised was the need to provide guidance on the evolving capacities of children. Jutta Kroll from the German Digital Opportunities Foundation mentioned the existence of a special group on age-appropriate design within the European Commission, indicating a recognition of the importance of tailoring digital content and experiences to suit children’s developmental stages. The sentiment expressed in this regard was one of questioning, suggesting a desire to better understand how to navigate the evolving digital landscape in a way that benefits children’s well-being and educational development.

The importance of involving parents in their children’s digital life was also emphasized during the discussion. Amy from ECHPAD International highlighted the importance of parents being actively engaged in their children’s gaming and digital experiences. Additionally, Carmen, a parent, expressed the view that online life is not a necessity for children, underscoring the critical role of parental education in safeguarding their well-being in the digital world. This sentiment emphasized the need for parents to stay informed and involved to ensure their children’s online safety and well-being.

Another worrisome issue identified was the lack of pedagogical understanding among developers. Carmen expressed concern regarding developers’ limited experience in educational theory and practice, highlighting the importance of incorporating pedagogical expertise into the development of digital content and platforms aimed at children. This worry reflected the need for developers to have a deep understanding of how children learn and develop so that digital resources can effectively promote quality education.

Finally, the speakers questioned the next steps to address these concerns. David from the Association for NGOs Insurance Group in the Asia-Pacific region specifically raised the issue of creating guidelines for parents, educators, and workers. This standpoint emphasized the necessity of establishing clear guidelines and engagement strategies to support parents, educators, and those working with children in effectively navigating the digital landscape and ensuring children’s well-being and educational growth.

Overall, the speakers stressed the importance of promoting online safety and well-being for children. Genuine child participation, appropriate guidance for evolving capacities, parental involvement, pedagogical understanding among developers, and the creation of guidelines for parents, educators, and workers emerged as key areas of focus. These observations highlighted a collective desire to ensure a positive and supportive digital environment for children, where their rights, education, and safety are prioritized.

Shuli Gilutz

Digital play is increasingly recognised as a crucial component of children’s well-being and development. Research has shown that digital play can provide positive experiences that promote children’s overall welfare. It is considered one of the most important ways for children to interact with the world. However, there is a pressing need for the design industry to prioritise the creation of safe, engaging, and beneficial digital play experiences specifically tailored for children.

Many designers are eager to create positive and empowering digital play experiences for children, but they lack the necessary training and guidance to do so effectively. Collaborative efforts are underway to work with designers and understand their requirements. The aim is to develop a comprehensive guide that will enable them to create positive digital experiences for children.

The project is built upon research, and the current stage involves consulting with designers from companies across the globe. The ultimate goal is to provide businesses with a guide that is grounded in real data about children and technology. The team hopes that this will dispel myths and misconceptions surrounding the topic and educate designers on best practices.

Creating a guide for businesses based on real data about children and technology is crucial in ensuring that child-friendly digital experiences are prioritised. By aggregating information from global companies, the team plans to develop a prototype that will serve as a valuable resource for designers. The final product, expected to be released in the autumn, will provide designers with the knowledge and insights necessary to create safe and beneficial digital play experiences for children.

In addition to the design industry’s responsibilities, there also needs to be a broader shift in designing for children. Instead of viewing it as a mere regulatory requirement, there should be an understanding that this is the future. Designers must embrace the challenge of creating a fully holistic environment for children to thrive in, focusing not only on safety but also on their overall well-being.

Companies that fail to adapt their design approaches to meet the needs of children may ultimately be left behind. The industry must pivot its perspective and prioritise designing for children. This shift in approach is vital to ensure that children have access to digital experiences that enhance their development and well-being.

Beyond the design industry’s role, parents also play a crucial part in supporting their children’s digital play experiences. Engaging in digital games with their children helps parents understand the gaming world and actively participate in their children’s activities, thereby contributing to their well-being. Furthermore, direct discussions between parents and children about concerns and motivations are proven to be effective in helping children understand the importance of activities such as playing outside or balancing their digital and non-digital pursuits. These conversations enhance children’s understanding and overall well-being.

In conclusion, digital play is a critical aspect of children’s well-being and development. The design industry needs to prioritise the creation of safe, engaging, and beneficial digital play experiences. Efforts are underway to develop a guide based on real data about children and technology for businesses to ensure child-friendly design practices. There needs to be a broader shift in designing for children, viewing it as the future and creating a fully holistic environment. Companies that fail to adapt may be left behind. Parental engagement and direct discussions with children are essential in supporting their well-being.

Adam Ingle

LEGO Group is committed to prioritising the well-being of children in their digital products. They actively avoid incorporating addictive qualities or manipulative design patterns into their games. By doing so, LEGO ensures that children can engage with their digital experiences in a healthy and balanced manner.

In addition to designing responsible digital products, LEGO Group is taking the initiative to improve overall digital experiences for children. They are collaborating with UNICEF to drive this effort and aim to elevate industry best practices. By working together with other industry leaders, LEGO Group intends to create a coalition that will promote better digital experiences for children worldwide.

Recognising the online safety crisis, LEGO Group is actively promoting proactive measures and cultural change within the digital industry. They understand that the failure to invest in children’s well-being can lead to potential harm and a loss of trust in the digital industry as a whole. By addressing the crisis head-on, LEGO Group demonstrates their commitment to protecting children and building a safer online environment.

Adam Ingle, a prominent advocate for children’s well-being, believes in a holistic approach to digital design. He emphasises the importance of not only focusing on safety and protection but also nurturing children’s creativity and imagination. Ingle argues that an overemphasis on addressing online harms could result in sterile digital environments. He believes that a certain level of flexibility and age-appropriate design is necessary to create engaging and beneficial digital experiences for children.

Moreover, Ingle calls for governments and policymakers to establish regulatory frameworks that incentivise the development of productive digital experiences for kids. He highlights that current discussions primarily revolve around addressing online harms and urges for a broader perspective that considers the impact on children’s well-being. Government intervention, according to Ingle, can play a crucial role in fostering child well-being in the realm of digital design.

To implement age-appropriate design, LEGO is actively involved in the EU’s AADC (Age Appropriate Design Code) method. This method allows tailoring privacy policies, default settings, and aspects of game design to cater to the specific social interaction needs of different age groups.

When it comes to teenagers, finding the right balance between their social connections online and the associated risks is crucial. It is acknowledged that some level of social connection is necessary for teens’ well-being, as it enables them to form organic friendships online. However, measures can be implemented to mitigate the risks associated with teens’ online interactions, such as disabling certain features for younger age groups and promoting online safety education.

In conclusion, LEGO Group’s commitment to prioritising children’s well-being in their digital products is evident through their conscious design choices and collaboration with UNICEF. They actively address the online safety crisis and advocate for a holistic approach to digital design that balances safety, protection, creativity, and imagination. Adam Ingle’s call for regulatory frameworks and the promotion of age-appropriate design further underscores the importance of creating productive and beneficial digital experiences for children.

Sabrina Vorbau

The strategy for a better internet for kids is being revised through a co-creation approach. This approach involves actively involving children by consulting them across Europe. Open discussions with adults, mainly focusing on parents and teachers, have also taken place. Additionally, experts from various fields including industry, academia, and policymakers from the national level have been invited to provide their insights. This collaborative effort ensures that the revised strategy takes into account the perspectives of all key stakeholders involved.

The importance of involving young people in policy decision-making is emphasized. By including children and young people in all aspects of the decision-making process, it ensures that the policies and tools implemented effectively meet their needs. This can be achieved through various means such as conducting consultations, involving young people in expert groups, and actively cooperating with them in organizing events like the Safer Internet Forum. This approach recognizes the expertise that young people possess and highlights the significance of their input in shaping policies that concern them.

Meaningful youth participation is considered vital in the pursuit of better internet policies. While progress has been made in this area, more efforts are needed to ensure that children and young people are involved as part of a multi-stakeholder approach. It is crucial to see young people as experts in their own right, rather than merely as a necessity in decision-making processes. By acknowledging their expertise and actively involving them, it maximizes the positive impact of policies and initiatives implemented.

Furthermore, there is a call for more stakeholders, particularly industry and policymakers, to implement the policies that have already been established. The big plus strategy, which is seen as a significant policy framework, plays a crucial role in ensuring children’s well-being. It is essential that this policy is effectively utilized and applied to achieve its intended goals. By implementing these policies and involving key stakeholders, including industry and policymakers, a more robust framework can be created to address the challenges and concerns surrounding children’s well-being in the digital world.

In conclusion, the co-creation approach to revising the strategy for a better internet for kids involves the active involvement of children, consultations with adults, and engagement of experts from various backgrounds. The inclusion of young people in policy decision-making processes is essential to ensure that their needs are effectively met. Meaningful youth participation, along with the implementation of existing policies, particularly by industry and policymakers, is crucial for achieving a safer and more inclusive internet environment for children. The big plus strategy sets the framework for addressing children’s well-being, and it is vital that it is adequately implemented.

Josie

The session concentrated on the significance of prioritising children’s views and well-being in the digital environment. Shuli Gillets, a renowned expert in child-centred design with over 20 years of experience, discussed the power and importance of designing technology that has a positive impact on children. Gillets stressed the need to focus on three key principles: protection, empowerment, and participation.

Adam Ingle, the Global Lead for Digital Policy at the LEGO Group, explained the motivation behind prioritising this issue. He argued that businesses have a responsibility to uphold high standards of safety, privacy, and security in their digital products. Ingle advocated for policies that give children more agency online and highlighted the potential risks associated with neglecting to invest in the well-being of children.

Professor Amanda Third introduced the Ritech Responsible Innovation in Technology for Children framework, which aims to create a digital world that prioritises children’s well-being. She emphasised the importance of conducting research centred around children and their experiences in the digital age. Additionally, an ongoing research project on responsible innovation in technology for children was discussed.

The session concluded with panelists sharing their thoughts on taking action to achieve positive design for children’s well-being. They underlined the need for collaboration between government, industry, and young people, as well as the importance of taking tangible steps in the pursuit of this vision.

In summary, the session provided valuable insights into the importance of prioritising children’s well-being in the digital environment. It highlighted the role that design, policy, and research play in creating a positive and secure digital space for children.

Amanda Third

The analysis examines various aspects of children’s digital play experiences, covering topics such as wellbeing, safety, participation, and design. It explores both positive and negative elements, providing a comprehensive understanding of the subject.

On the positive side, the analysis highlights the diverse and enjoyable experiences that children have with digital play, emphasising the joy and connection it brings. It also acknowledges the positive impact of creativity on children’s wellbeing, underscoring the importance of involving children in design processes.

In terms of safety, the analysis recognises that children face challenges online, including encounters with inappropriate content and potential safety issues. It emphasises the need for measures to protect children from these risks.

The analysis also explores the concept of child participation, noting its role in developing protective capabilities in children. It stresses the importance of reaching out to vulnerable and diverse children through partner organisations with expertise in engaging these groups.

A key focus of the analysis is the development of a wellbeing framework that supports the enhancement of children’s wellbeing through digital play. This framework, based on data analysis and children’s experiences, proposes indicators and measures to evaluate the impact of digital play experiences. Ongoing research involves testing the effectiveness of this framework through real-world digital play experiences.

Additionally, the analysis emphasises the importance of understanding children’s digital play experiences comprehensively. It advocates for actively listening to children and incorporating their perspectives into the design and evaluation process. This approach ensures that the framework and subsequent considerations reflect children’s actual experiences and needs.

The analysis also touches on the rights of the child as a guiding principle in this context, suggesting that any actions or decisions should be taken consciously and with a strong commitment to upholding children’s rights.

In conclusion, the analysis underscores the significance of children’s digital play experiences, providing insights into both the positive and negative aspects. It emphasises the need to ensure children’s safety, enhance their wellbeing, promote their active participation, and consider their diverse needs. Through ongoing research and the development of a wellbeing framework, the analysis aims to provide evidence-based solutions that contribute to the optimal design and enhancement of children’s digital play experiences.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Safeguarding the free flow of information amidst conflict | IGF 2023 WS #386

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Rizk Joelle

Digital threats and misinformation have a significant negative impact on civilians residing in conflict zones. The dissemination of harmful information can exacerbate pre-existing social tensions and grievances, leading to an increase in violence and violations of humanitarian law. Furthermore, the spread of misinformation can cause distress and a psychological burden among individuals living in conflict-affected areas. This hampers their ability to access potentially life-saving information during emergencies. The distortion of facts and the influence of beliefs and behaviours as a consequence of the dissemination of harmful information also contribute to raising tensions in conflict zones.

One concerning aspect is the blurred line between civilian and military targets in the context of digital conflicts. Civilians and civilian infrastructure are increasingly becoming targets of digital attacks. With the growing emphasis on shared digital infrastructure, there is an increased risk of civilian infrastructure being targeted. This blurring of lines undermines the principle of distinction between civilians and military objectives, which is a critical pillar of international humanitarian law.

Moreover, digital threats pose a threat to public trust in humanitarian organizations. Cyber operations, data breaches, and information campaigns not only damage public trust but also hinder the ability of humanitarian aid organizations to provide life-saving services. This erosion of trust compromises their efforts to assist and support individuals in need.

To address these challenges, it is crucial for affected communities to build resilience against harmful information and increase awareness of the potential risks and consequences in the cyber domain. Building resilience requires the involvement of multiple stakeholders, including civil society and companies. Information and communication technology (ICT) companies, in particular, should be mindful of the legal consequences surrounding their role and actions in the cyber domain. It is important that self-imposed restrictions or sanctions do not impede the flow of essential services to the civilian population.

In addition to community resilience and awareness-building efforts, policy enforcement within business models is crucial. Upstream thinking in the business model can help reinforce policies aimed at countering digital threats and misinformation. However, the discussion around policy enforcement in business models is challenging. It requires expertise and a feedback loop with tech companies to find effective and efficient solutions.

In conclusion, digital threats and misinformation have dire consequences for civilians in conflict zones. The dissemination of harmful information exacerbates social tensions and violence, while digital attacks on civilians and civilian infrastructure blur the line between military and civilian targets. These threats also undermine public trust in humanitarian organizations and hinder the provision of life-saving services. To tackle these challenges, it is essential to build community resilience, increase awareness, and enforce policies within business models. Collaboration between stakeholders and tech companies is key to addressing these complex issues and safeguarding the well-being of individuals in conflict zones.

Speaker

In conflict zones, technology companies face a myriad of risks and must carefully balance the interests of multiple stakeholders. These companies play a critical role in providing essential information and functions but can also unintentionally facilitate violence and spread false information. One major challenge is responding to government demands, such as granting access to user information, conducting surveillance, or shutting down networks. These demands can come from both sides of the conflict and may lack clarity or have excessively broad scope.

Dealing with government demands during peace is limited in conflict situations due to associated risks. Companies can request clarity on demand legality, respond minimally or partially, challenge the demands, or disclose them publicly. However, in conflict settings, these actions may pose significant risks.

To navigate these challenges, technology companies can implement various measures. These include establishing risk management frameworks, clear escalation procedures, and consistent decision reviews. By doing so, companies can better manage risks of operating in conflict zones. Collaboration with other organizations in coordinating responses in conflict regions and consulting with experts to understand potential implications of decisions can also help.

Respecting international humanitarian law is a key principle of corporate responsibility in conflict situations. Companies are expected to respect human rights and require guidance on respecting international humanitarian laws when conducting business in conflict-affected areas. Enhanced due diligence, considering heightened risks and negative human rights impacts, is recommended by the United Nations Guiding Principles on Business and Human Rights.

Further articulation is needed on what international humanitarian law means for technology companies, indicating further guidance is needed in this area. To address design issues in platforms, companies should consider building the capacity to apply a conflict lens during product development, better identifying and resolving issues in conflict zones.

Addressing information topics requires considering both upstream and downstream solutions. This comprehensive approach takes into account the flow of information from sources (upstream) to distribution and consumption (downstream).

Overall, technology companies operating in conflict zones face unique challenges and must navigate complex risks. Implementing effective risk management frameworks, respecting international humanitarian law, and incorporating a conflict lens into product development can better address the multifaceted issues they encounter. Further guidance is needed in certain areas to ensure operations in conflict zones align with established principles and standards.

Chantal Joris

The analysis delves into the challenges surrounding the free flow of information during conflicts. It starts by highlighting the digital threats that journalists and human rights defenders face in such situations. These threats include mass surveillance, content blocking, internet shutdowns, and other forms of coercion aimed at hindering the dissemination of information. The sentiment towards these challenges is negative, as they pose a significant threat to the values of freedom of expression and access to information.

Another significant aspect explored in the analysis is the role of tech companies in conflicts. Digital companies have become increasingly important actors in these situations, and the analysis argues that they have a responsibility to develop strategies to avoid involvement in human rights violations. This neutral stance reflects the need to address the complex ethical dilemmas faced by tech companies, balancing their business interests while safeguarding human rights.

The analysis also discusses the reliance of civilians on information communication technologies (ICT) during conflicts. Civilians often use ICT to ensure their safety, gain information on conflict conditions, locate areas of fighting, and communicate with their loved ones. This neutral sentiment highlights the significance of ICT in providing vital communication channels and access to information for affected civilians.

The analysis further sheds light on the attempts made by the army and political parties to control the narrative and shape the discourse during conflicts. Conflict parties often aim to manipulate information and control the narrative for various reasons. This negative sentiment highlights the detrimental impact of information control on the public’s understanding of conflicts and the potential for shaping biased opinions.

A key observation from the analysis is the necessity of a multi-stakeholder approach in conflict contexts. It stresses the importance of different actors, such as ICT companies, content moderators, and organizations like the International Committee of the Red Cross (ICRC), working collaboratively to tackle the diverse threats to information flow. This positive sentiment reflects the recognition that no single entity can address the complexities of information challenges during conflicts alone.

Moreover, the analysis calls for identifying gaps in understanding and addressing the issues related to information flow during conflicts. This neutral sentiment highlights the need for more clarity and targeted efforts to bridge these gaps. The conclusion emphasizes the importance of comprehensively addressing the challenges and harnessing the potential of information communication technologies to ensure the free flow of information during conflicts.

In conclusion, the analysis explores the various challenges and dynamics surrounding the free flow of information during conflicts. It highlights digital threats, the role of tech companies, civilian reliance on ICT, information control by conflict parties, the necessity of a multi-stakeholder approach, and the need for identifying gaps for clarity. With this comprehensive understanding, stakeholders can work towards developing strategies and policies that uphold the values of information access and freedom of expression in conflict situations.

Khattab Hamad

Sudan is currently embroiled in a civil war between two allied forces that began in 2013. However, the conflict has been riddled with challenges and disagreements, particularly regarding security agreements and the unification of the armies in Sudan. These disagreements resulted in the conflict’s end on April 15th. Unfortunately, the sentiment surrounding this war is negative.

Information control has played a significant role in the conflict, with internet disruptions and the spread of misinformation being notable events. Internet shutdowns during exams and civil unrest have been used by authorities to manipulate public opinion. The sentiment towards these events is negative.

Another issue in the conflict is the misuse of social media platforms, which have been exploited by both sides to spread their own narratives and manipulate public opinion. This misuse has prompted concerns about information imbalance and led platforms like META to take down accounts associated with the Rapid Support Forces. The sentiment towards this misuse is negative.

The RSF (Sudanese Armed Forces) and the Arab Support Forces have been criticized for their harmful practices towards civilians and the nation’s infrastructure. Privacy violation cases, including the use of spyware, have been reported. The RSF imported the predator spyware of Intellexa, while the National Intelligence and Security Service (NISS) imported the remote control system of the Italian company hacking team in 2012. The sentiment towards these privacy violations is negative.

The conflict has also had a significant impact on the ICT (Information and Communication Technology) sector in Sudan. Power outages have impaired network stability and e-banking services, forcing ICT companies to rely on uninterruptible power supply systems and generators. The sentiment towards this situation is negative.

On a positive note, telecom workers have been recognized as crucial for maintaining access to information infrastructure during conflicts. It is argued that they should be given extraordinary protection, similar to doctors and journalists, due to their vital role in ensuring the continuous flow of information. The sentiment towards this proposal is positive.

In conclusion, Sudan’s civil war has had far-reaching consequences, impacting security agreements, information control, privacy rights, the ICT sector, and the protection of key players in the information infrastructure. Efforts to address these challenges and protect these key players are essential for promoting peaceful resolutions and mitigating the impact of future conflicts.

Tetiana Avdieieva

During the armed conflicts in Ukraine, there have been severe restrictions on free speech and the free flow of information. Since the war began in 2014, the country has witnessed a decline in the protection of free speech and access to information. This has resulted in mass surveillance, content blocking, Internet shutdowns, and sophisticated manipulation of information.

Digital security concerns have also arisen during these conflicts. Attacks on media outlets and journalists largely originate from Russia, with DDoS attacks on websites disrupting connectivity. Coordinated disinformation campaigns on social media and messaging platforms further exacerbate the situation, influencing public opinion and spreading false narratives.

One key issue highlighted is the control over narratives and the free flow of information during armed conflicts. The ability to shape public opinion becomes a powerful tool in these circumstances, with the potential to influence the course of the conflict and its outcomes. It is crucial to address this issue by formulating an exit strategy that lifts restrictions from the outset of the armed conflict. This strategy should consider the vulnerability of post-war societies to malicious narratives and work towards reestablishing human rights that were restricted during the conflict.

Another significant concern is the gap in international law regarding the handling of information manipulation during peace and conflict. Current legal frameworks do not adequately address the issue, leaving room for exploitation and the spread of disinformation that incites aggression and hatred.

There have also been attempts to shift the focus away from the harm inflicted upon civilians and the suppression of opposition during these conflicts. These attempts to change the narrative divert attention from the atrocities committed and the need to protect the rights and safety of civilians.

The extensive support for the invasion among the Russian community is a cause for concern. According to data from Meduza, a significant portion of Russian citizens, ranging from 70% to 80%, support the invasion. This highlights the challenge of countering misinformation and disinformation within Russia and addressing the narratives that drive aggression and illegal activities.

The role of ICT companies in moderating harmful content in conflict settings is crucial. These companies need assistance, both globally and locally, to effectively combat harmful information. This includes distinguishing between harmful information and illegal content, as well as understanding the localized contexts in which they operate. Local partners can provide valuable insights into regional issues, such as identifying and addressing local slur words and cultural sensitivities.

However, it is important to approach the role of tech giants with caution, avoiding a strategy of blaming and shaming. Over-censorship and driving people to unmoderated spaces can be unintended consequences of such an approach. Instead, a collaborative approach that involves ICT companies, multi-stakeholder engagement, and responsible corporate practices is necessary to foster a safer online environment.

In conclusion, the armed conflicts in Ukraine have led to significant restrictions on free speech and the free flow of information. Digital security concerns, information manipulation, and the spread of disinformation within Russia pose additional challenges. It is crucial to adopt an exit strategy that lifts restrictions and safeguards vulnerable post-war societies from malicious narratives. Efforts should also be made to address gaps in international law regarding the handling of information manipulation. The support for the invasion among the Russian community and attempts to divert attention from civilian harm and opposition suppression further complicate the situation. ICT companies play a crucial role in moderating harmful content, and a collaborative approach is necessary to strike a balance between curbing misinformation and ensuring freedom of expression.

Audience

An analysis conducted by Access Now reveals that prevailing trends in content governance are endangering freedom of expression and other fundamental rights. Several issues have been identified in relation to parties involved in conflicts, highlighting the dangers faced by these rights.

During times of crisis, content governance has been exploited in various ways, breaching international humanitarian law. One concerning practice is the intentional spread of disinformation as a warfare tactic. Additionally, platforms have been used for population movement, and sharing content depicting prisoners of war illegally has been observed. These actions not only violate international laws but also contribute to the erosion of freedoms.

While internet restrictions exist in conflict zones, it is interesting to note that Russia maintains significant accessibility to various platforms. Many Ukrainian media and telegram channels continue to be effectively available in Russia. Furthermore, despite restrictions, information can still flow through various social media and messaging platforms. This highlights the complexity of internet restrictions and the need for further examination.

The analysis also underlines the need for international laws addressing informational warfare. Both Russia and Ukraine face internet warfare, yet there is a lack of legal frameworks specifically designed to address this issue. The absence of such laws creates a significant gap in addressing and countering the threats posed by disinformation campaigns and cybersecurity breaches.

Russia particularly faces numerous cybersecurity threats and disinformation campaigns, primarily originating from Ukraine. Instances of Russian citizens’ personal data being leaked and published online have been identified, along with the identification of over 3,000 disinformation narratives against Russia. These threats pose challenges to the integrity and security of information in the country.

Social media platforms’ over-enforcement is flagged as a major problem for media and journalists, with many legitimate news sources having their accounts suspended or restricted. This issue is particularly prevalent in cases involving conflict settings, such as Palestine and Afghanistan, where the presence of dangerous organizations contributes to heightened enforcement measures.

The complexity of platform rules is highlighted as a concern in conflict settings. In such situations, rules can be confusing and easily violated, with typical infractions including the posting of images depicting dead bodies. This observation sheds light on the challenges faced by content creators and users as they navigate restrictive guidelines during conflicts.

Addressing misinformation requires the implementation of upstream solutions, as highlighted by Maria Risa. This approach focuses on addressing misinformation at its root causes, rather than solely addressing its dissemination. By focusing on upstream solutions, it is possible to create more effective strategies to combat misinformation and its harmful effects.

The analysis raises questions about the design of platforms and the role of algorithms and business models in managing information. It suggests the need to reconsider and possibly redesign these aspects to ensure fairness, accuracy, and accountability in content dissemination. This observation emphasizes the ongoing need for innovation and improvement within the digital landscape.

BSR, a leading global organization, provides a toolkit for companies on how to conduct enhanced human rights due diligence in conflict settings. This initiative aims to promote the respect and protection of human rights, even in challenging circumstances. The toolkit, developed in collaboration with Just Peace Labs, offers detailed guidance, making it an invaluable resource for responsible business practices.

Furthermore, the analysis advocates for human-centered approaches in digital transformation, particularly in conflict zones. Stakeholder consultation can be challenging in war zones, highlighting the importance of ensuring that the interests and needs of all individuals are considered and that no one is left behind in the process.

There is a noted lack of focus on countries like Afghanistan and Sudan in discussions surrounding these issues. This observation emphasizes the need to broaden the scope of discourse and pay equal attention to conflicts and human rights violations occurring in these regions.

Global media platforms play a substantial role in shaping public opinion, primarily through their recommendation algorithms. However, concerns arise regarding the impartiality and bias of these algorithms. The analysis reveals that global media platforms often alter their recommendation algorithms to favor one side in informational wars, despite presenting themselves as neutral. This highlights the potential influence and manipulation of public opinion through these platforms.

Given the significance of global media platforms, the analysis argues that global society should exert more pressure on these entities. Increased accountability and transparency are necessary to ensure that these platforms operate in an unbiased and fair manner, considering the critical role they play in shaping public discourse.

In conclusion, the prevailing trends in content governance pose a threat to freedom of expression and fundamental rights. Exploitation of content governance during times of crisis, the need for international laws addressing informational warfare, and the over-enforcement by social media platforms are among the challenges highlighted in the analysis. The complexity of internet restrictions and the design of platforms also warrant further consideration. Additionally, the importance of upstream solutions, human-centered approaches, and the inclusion of marginalized regions in discussions emerge as key insights. Efforts towards increasing platform accountability and transparency are crucial to safeguarding a fair and unbiased digital landscape.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Sandboxes for Data Governance: Global Responsible Innovation | IGF 2023 WS #279

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Ololade Shyllon

The utilization of sandboxes, which are regulatory frameworks that permit controlled experimentation and innovation in the financial technology (FinTech) sector, has encountered challenges in Africa and the Middle East. Presently, there are only one or two FinTech-related sandboxes in the region, indicating a slow start in this field. This lack of progress is viewed negatively.

However, there is recognition of the necessity for positive outcomes regarding sandboxes across the entire region. Sandboxes can provide a conducive environment to test new ideas, products, and services. Fostering innovation in the FinTech sector is considered crucial for economic growth and development.

In terms of regulatory collaboration and policy-making, there is a positive sentiment towards regional cooperation. This collaboration can enhance the understanding of the FinTech ecosystem and enable stakeholders to learn from one another. By working across borders, stakeholders can share insights and enrich their collective understanding. Moreover, the existence of global treaties provides a basis for common rules, despite variations in individual legal systems. This regional collaboration is seen as a proactive step towards achieving the Sustainable Development Goals (SDG) related to industry, innovation, and infrastructure (SDG 9) as well as partnerships for the goals (SDG 17).

Advocates for a harmonised approach to regulation and policy-making believe that this method can yield positive outcomes. Specifically, the organisation META supports and promotes a harmonised approach, emphasising the importance of collaboration and experimentation. By identifying basic principles applicable globally, a harmonised approach can help to create a more cohesive regulatory environment.

However, the likelihood of increasing harmonisation beyond the national level is deemed to be complex. This complexity arises from various challenges, such as differences in legal systems and the unique data governance challenges faced in the region. Despite the challenges, sandboxes are considered crucial in stimulating innovation within Africa and the Middle East. Implementing sandboxes requires significant resources and time, given the nascent stage of data governance in the region. Nevertheless, the potential benefits and importance of fostering innovation drive the push for sandboxes.

In conclusion, sandboxes in Africa and the Middle East have faced challenges in their establishment. However, there is a recognised need for positive outcomes regarding sandboxes across the region. Regional collaboration in regulation and policy-making is seen as a means to better understand the FinTech ecosystem. Advocates for a harmonised approach believe it can contribute to a more coherent regulatory environment. Despite the complexity and challenges, sandboxes are seen as crucial for stimulating innovation.

Dennis Wong

Singapore has been implementing sandboxes as a policy mechanism to experiment with uncertain applications and technologies. These sandboxes are widely used to explore frontier technologies and collaborate with the industry to ensure clarity and compliance. The use of sandboxes has proved beneficial, providing confidence in data protection, accelerating the deployment of technologies, facilitating regulatory guidance, and promoting business collaborations. Sandboxes also contribute to regulatory understanding and transparency, as the findings from sandbox experiments are published, offering insights into regulatory issues.

It is important to note that sandboxes are not designed for volume but for specific cases with clear objectives. They are intended to provide a safe environment for experimentation and to understand the underlying technology and industry needs more clearly. Sandboxes also facilitate the publication of the experimental findings, enabling regulators and other interested parties to gain a deeper understanding of the regulatory landscape.

However, the process of identifying technology players for companies can be time-consuming, particularly when companies have specific requirements such as a need for privacy-enhancing technology. In such cases, the process becomes longer and more involved.

While sandboxes offer valuable insights and guidance, there are also other policy innovation tools like policy clinics that can provide quicker advice on accountabilities. Policy clinics can expedite the process by offering timely guidance on accountability matters.

Coordinated efforts among regulators are crucial to address sector-specific challenges. If a regulatory question arises in the finance or healthcare sector, the respective authority is brought in to work jointly on addressing the issue. This emphasizes the need for collaboration and partnerships among regulators.

Furthermore, discussions related to sandboxes are primarily domestic but include industry players who operate globally. The sharing of learning and experiences from sandboxes is seen as essential, with the transferability of such knowledge being highly valued by stakeholders.

Dennis Wong, the Data Protection Deputy Commissioner and the Assistant Chief Executive of IMDA, supports broad conversations and principles that everyone can agree on. As interest in sandboxes as a regulatory tool grows, it leads to more tech conversations and meetings with interested regulators, promoting international collaboration.

It is important to understand that the regulatory sandbox is not a decision-making or exemption-providing mechanism. Instead, it serves as a dialogue-based guidance tool to explore areas of regulation where there may be uncertainty. The emphasis is on dynamic and agile regulatory development involving ongoing engagement and a back-and-forth process, rather than providing a final answer at the end.

To conclude, Singapore’s use of sandboxes as a policy mechanism for experimentation and regulation has proven beneficial in facilitating innovative solutions, promoting compliance, and fostering collaboration between industry and regulators. The findings from sandbox experiments offer valuable insights into regulatory issues, supporting the development of transparent and effective regulatory frameworks. Coordinated efforts, both domestically and internationally, are necessary to address sector-specific challenges and promote the transferability of knowledge gained from sandboxes. The regulatory sandbox, as a guidance tool, contributes to dynamic and agile regulatory development by facilitating ongoing engagement and dialogues.

Kari Laumann

During the discussion, the speakers emphasized the significance of learning from the experiences of others when it comes to implementing and operating sandboxes. They highlighted the importance of reaching out to experts in the field, such as the British Data Protection Authority (ICO), to gather insights and knowledge. The speakers stressed that sharing information and learning from established sandboxes, like the one implemented by ICO, can greatly contribute to the success of a new sandbox.

The speakers also highlighted the need to adapt sandboxes to fit specific contexts when transferring them from one place to another. Cultural and other differences were cited as factors that necessitate customized adaptations. The speakers shared their experience of ensuring that the sandbox they learned from ICO was tailored to suit their own context, making it more effective in achieving their objectives.

Another key point raised during the discussion was the importance of tailoring the sandbox to the needs of the target audience. The speakers emphasized that while sharing information is crucial, it is equally important to create a sandbox that is tailored to the purposes and needs of the group it is meant for. This ensures that the sandbox effectively addresses the specific challenges and requirements of the target audience, maximizing its impact.

The regulatory sandbox was explored as a tool that offers guidance and clarity to companies. It allows for the exploration of areas of regulation where uncertainty exists. The speakers clarified that regulatory sandboxes do not provide exemptions or approvals, but rather facilitate the examination of regulatory gray areas within laws like the General Data Protection Regulation (GDPR). It was emphasized that regulations, including GDPR, continue to apply within the sandbox, ensuring that the applicable regulatory framework is not compromised.

Additionally, it was noted that organizations’ regulatory powers, such as those of META (presumably a regulatory authority), are strictly regulated by GDPR. This serves to maintain the integrity and accountability of regulatory bodies, ensuring that they comply with case handling and enforcement actions under GDPR.

In conclusion, the discussion highlighted the importance of learning from others’ experiences and adapting sandboxes to specific contexts. Tailoring the sandbox to the needs of the target audience and ensuring compliance with relevant regulations, like GDPR, are crucial factors in the successful implementation and operation of sandboxes. The exchange of insights and lessons learned from established sandboxes can greatly contribute to the effectiveness and impact of new sandboxes.

Pascal Koenig

During an online discussion on regulatory sandboxes, the participants emphasized the importance of learning from experiences and promoting international collaboration. There was a consensus on the need for sharing knowledge and transferring sandboxes from one context to another, while also acknowledging the need for adaptation. One example cited was Denise’s sandbox, which provided inspiration to others. The significance of cross-border data flows and enabling collaboration between regulators and authorities were also highlighted. The possibility of increasing harmonization of sandboxes on a regional level was discussed, with different perspectives on likelihood. Overall, the discussion focused on the importance of learning, collaboration, and potential harmonization to advance regulatory sandboxes globally.

Lorrayne Porciuncula

This comprehensive analysis delves into the topic of regulatory sandboxes, which are viewed as a means of policy prototyping for experimentation purposes. It highlights several key points that demonstrate the significance and potential of sandboxes in various contexts.

One important aspect discussed is the diverse skills required for the successful deployment of sandboxes. The analysis emphasizes that there is no single skill or set of skills that is universally applicable to all sandboxes and use cases. Instead, the skills needed depend on factors such as national jurisdiction, institutional framework, and the specific issue being addressed. This insight underscores the flexibility and adaptability of sandboxes, allowing them to be tailored to different circumstances.

Stakeholder engagement is another critical factor highlighted in the analysis. It argues that sandboxes should be designed to engage stakeholders from the very beginning, during the design phase. This approach fosters institutional trust and ensures that the sandboxing process is inclusive and representative of diverse perspectives. The analysis contrasts this approach with the current state of sandbox development, which often involves merely posting a consultation online and then leaving it. Instead, it suggests a more iterative and hands-on process that actively involves stakeholders throughout the sandbox implementation.

The analysis also focuses on the importance of capacity building and the creation of a community of practice to share best practices and reduce the cost of implementing sandboxes. It mentions a project in Africa that aims to build such a community through a Sandbox Forum. The forum’s approach prioritizes direct engagement and practical application over theoretical discussions, reinforcing the need for a collaborative and action-oriented approach to sandboxing.

Evaluation of sandbox implementation is another crucial aspect discussed in the analysis. It emphasizes the need to measure and monitor sandbox success using different methods. Factors influencing sandboxing success include stakeholder involvement, risk mitigation, and the technology used. Sharing this knowledge and evaluating sandbox outcomes can lead to improvements in the sandboxing process overall, enhancing its effectiveness in promoting innovation and achieving desired outcomes.

The analysis also explores the role of sandboxes in regulatory frameworks, particularly in the fintech sector. It highlights how sandboxes allow regulators to go beyond traditionally regulated entities, as exemplified by the success of open calls for different companies and innovative solutions in fintech sandboxes, such as Brazil’s PIX payment system. Ensuring fairness and avoiding regulatory capture are identified as important considerations in sandbox implementation.

Mitigating the risk of bias and regulatory capture in sandboxes is further discussed in the analysis. It suggests that regulatory frameworks should be aware of these risks and develop appropriate measures to anticipate and address them. Open conversations about best practices and framework setup are considered essential in this regard.

The analysis also underscores the impact of international collaboration in the deployment of regulatory sandboxes. It highlights the potential of cross-border perspectives to enhance the understanding and deployment of privacy-enhancing technologies and data intermediaries. Furthermore, it notes that new trade agreements can create opportunities for testing business, societal, and regulatory issues among participating countries. This observation emphasizes the crucial role of international cooperation in addressing complex issues related to innovation, data protection, public health, and climate change.

In conclusion, this analysis advocates for a comprehensive and inclusive approach to regulatory sandboxes. It emphasizes the need for diverse skills, stakeholder engagement, capacity building, evaluation, fairness, and international collaboration. By adopting such an approach, regulatory sandboxes have the potential to foster innovation, reduce inequalities, and tackle complex global challenges. The analysis provides valuable insights and recommendations for policymakers, regulators, and stakeholders involved in the design and implementation of regulatory sandboxes.

Moraes Thiago

The speakers highlighted several important points regarding sandbox initiatives in the analysis. One of the main points emphasized the need to foster dynamic discussions on strategies that stimulate innovation while upholding human values. It was acknowledged that sandbox initiatives play a significant role in promoting innovation and ensuring adherence to fundamental values of humanity. The primary goal of this session was to encourage a dynamic discussion among all relevant stakeholders.

Another significant point discussed in the analysis was the launch of the ANPD Regulatory Sandbox on AI and Data Protection. This initiative was created in collaboration with partners like CAF Consultants, aiming to provide a space for innovative ideas while safeguarding individual privacy and data protection. It was recognized that striking a balance between promoting innovation and protecting privacy is crucial in the development of sandbox initiatives.

The importance of international collaborations in shaping the future landscape of sandboxes was also emphasized. It was acknowledged that international collaborations play a crucial role in shaping the future of data governance and AI innovation. Collaboration among different countries and stakeholders is seen as a key driver for advancing regulatory sandboxes and ensuring collective progress.

Furthermore, the analysis highlighted that the call for contributions for the ANPD Regulatory Sandbox will be inclusive by accepting submissions in English. This inclusivity in language aims to make the dialogue more accessible and enable a broader range of stakeholders to participate. By accepting submissions in English, the call for contributions aims to reduce barriers and promote a more inclusive and diverse discussion.

In conclusion, the analysis underlined the significance of sandbox initiatives in stimulating innovation and upholding human values. The launch of the ANPD Regulatory Sandbox on AI and Data Protection aims to strike a balance between innovation and privacy protection. International collaborations were recognized as an essential element in shaping the future of data governance and AI innovation. Lastly, the call for contributions being inclusive and accepting submissions in English adds to the accessibility and diversity of the dialogue.

Axel Klapp-Hacke

Data is considered a critical asset for economic growth and sustainable development. It provides valuable insights for decision-making in areas such as food security, climate change mitigation, and health policies. Data empowers policymakers and private organizations to allocate resources effectively, solve problems, and prepare for risks. However, to ensure the fair and responsible use of data, regulatory frameworks that protect data sovereignty and security need to be strengthened. These frameworks strike a balance between reaping the benefits of data utilization and safeguarding citizens’ rights. Additionally, data and artificial intelligence (AI) have great potential in achieving the Sustainable Development Goals (SDGs). They can facilitate the delivery of medical services, increase efficiency in agriculture, and improve food security, contributing to broader sustainable development objectives. Regulatory sandboxes are also discussed as a means to promote a free, fair, and open data economy. These sandboxes provide a controlled environment for testing and developing innovative solutions while complying with regulatory requirements. By embracing the full potential of the data economy through regulatory frameworks and innovative approaches like sandboxes, we can harness the transformative power of data for economic growth and sustainable development.

Agne Vaiciukeviciute

GovTech sandboxes have emerged as a key component of Lithuania’s innovation ecosystem. These sandboxes, initiated in 2019, have received recognition at the European level for their positive impact on public governance. They provide a controlled environment for testing and implementing innovative solutions in the government sector. Several artificial intelligence (AI) solutions are currently being used by the Lithuanian government, demonstrating the success of GovTech sandboxes in driving technological advancements.

Lithuania places great emphasis on the potential of 5G technologies for innovation. With 90% coverage of the population, Lithuania has invested over 24 million euros in 5G-based projects, with more than 53 projects worth over 124 million euros in the pipeline. The government’s proactive approach to investing in 5G technologies reflects their commitment to harnessing the power of emerging technologies.

The Lithuanian government advocates for a flexible and adaptive regulatory framework that responds to technological innovation. The Sandbox regime in Lithuania enables the government to adapt regulations in line with advancements in technology. This fosters a regulatory environment that supports innovation and allows for the exploration of new possibilities.

To ensure unbiased and inclusive solutions, Lithuania mandates the participation of diverse stakeholders, including higher education institutions and civil society, in the sandboxes. This approach prevents a one-sided approach in the sandbox solutions and promotes fair outcomes in the innovation process.

In Lithuania, sandboxes primarily focus on mature technologies and ideas rather than early-stage testing. This strategic approach ensures that the sandboxes are effectively used to advance technologies with strong potential for real-world implementation.

While collaboration with other countries, such as the United Kingdom, for the establishment of sandboxes is valued, Lithuania recognizes that harmonization may not be necessary in the short-term. Cross-border collaboration is seen as more beneficial, allowing countries to work together and learn from each other’s experiences.

Learning from experiences and sharing knowledge is considered crucial for the regulation of innovations. Collaborations with the UK have provided valuable insights into the establishment and operation of sandboxes. The importance of learning from experiences is highlighted, although it is too early to implement harmonization as the concept of sandboxes is still actively being discussed.

Sandboxes are viewed as a vital tool in Lithuania to test and validate innovations. Government policies are closely aligned with the process of sandbox testing, and policy-makers work closely with those involved in testing systems. This reflects the country’s commitment to fostering innovation and ensuring that policies and regulations are effective in real-world scenarios.

The need for regulations to be dynamic and adaptable to reality is emphasized in Lithuania. Existing regulations without practical use cases indicate a disconnect with the evolving technology landscape. Additionally, sandbox testing may uncover failures or unforeseen challenges, further highlighting the necessity of regulatory adaptability.

In conclusion, GovTech sandboxes have become a central part of Lithuania’s innovation ecosystem, receiving recognition and awards for their positive impact on public governance. The country’s focus on 5G technologies, flexible regulatory frameworks, diverse stakeholder participation, and testing mature technologies in the sandboxes demonstrate their commitment to fostering innovation. Collaborations with other countries, learning from experiences, and the importance of dynamic regulations contribute to Lithuania’s progressive approach to driving technological advancements.

Audience

The discussion focused on the use of sandboxes in different sectors and explored the advantages and concerns associated with their implementation. One pertinent aspect was the AI Act, which stipulates that a national authority should operate a national sandbox. However, concerns were raised regarding the practicality of implementing this legislation. Specifically, there were apprehensions about the significant amount of time and resources required to study and create a test base for each use case.

Sandboxes were also discussed in relation to their potential role in combatting misinformation. CNET, for example, has developed a sandbox specifically designed to address this issue. An audience member raised a question about how civil society can utilise CNET’s misinformation sandbox beyond government use. This prompted consideration of the broader applications and benefits of sandboxes, including their potential use in tracking and analysing the spread of technology-driven misinformation, as well as developing countermeasures.

The value of sandboxes as a space for companies to engage with civil society and build trust was highlighted. It was suggested that sandboxes could serve as a crucial preliminary step before implementing regulations. This approach allows for flexible collaboration between companies and civil society to find appropriate solutions and establish trust-building efforts.

The sandbox approach was deemed particularly useful in the early stages of policy development or policy interrogation, particularly for framing the problem at hand. This experimental tool offers a unique opportunity to explore different policy options, and was seen as an effective way to address complex regulatory challenges.

However, limitations in participation were raised as a potential issue. Due to their nature, the number of firms that can participate in a sandbox is inevitably limited. This could restrict the diversity and inclusivity of the sandbox ecosystem.

Ensuring fairness and preventing distortion of competition were also identified as important considerations when implementing sandboxes. It was questioned how to guarantee that participation in sandboxes does not result in unfair advantages for certain companies. This issue underscores the importance of maintaining a level playing field and reducing inequalities.

Moreover, concerns were expressed about potential regulatory capture in the sandbox process due to the close interaction between regulatory authorities and participating companies. It was highlighted that mechanisms need to be established to prevent regulatory capture and maintain impartiality.

Additionally, the timeframe for operationalising a sandbox was raised as a concern. Some participants questioned the readiness and strictness of regulators in intervening effectively and efficiently.

Overall, the discussion called for advocacy towards adopting flexible, scalable, and dynamic regulatory methods. Sandboxes were viewed as one of the tools to achieve these objectives. While they offer important benefits, such as fostering conversations between regulators and breaking concentration in smaller financial sectors, the limitations and challenges associated with their implementation must be carefully considered to optimise their potential impact.

An interesting observation from the discussion is that sandboxes can facilitate the growth of digital banks and electronic money issuers. As seen in the case of Pakistan, sandboxes enabled these emerging financial entities by providing a regulated environment in which they could operate.

In conclusion, the use of sandboxes in various sectors offers both benefits and challenges. While they provide a space for experimentation, innovation, and collaboration, concerns exist regarding implementation, participation limits, fairness, regulatory capture, and operationalisation. Efforts must be made to address these concerns, and sandboxes should be integrated into a broader regulatory framework that promotes inclusivity, fairness, and effective policy development.

Armando Guío

Regulatory sandboxes are gaining attention as an effective solution for addressing regulatory concerns related to Artificial Intelligence (AI) and data. These sandboxes, which are being implemented worldwide, provide a controlled environment for testing and evaluating innovative technologies without rigid regulatory constraints. They have the potential to facilitate the development and implementation of responsible and ethical AI and data practices.

Different countries have adopted unique approaches to implementing regulatory sandboxes. The fintech sector, in particular, has been a strong advocate and driver of regulatory sandboxes. The experiences of countries such as Brazil, Lithuania, Ethiopia, Germany, Norway, and Singapore have been discussed in relation to their sandbox implementations. These discussions aim to learn from the successes and challenges faced by these countries and inform the development of best practices.

Regulatory sandboxes offer the opportunity for authorities to better understand the real impact of emerging technologies, such as AI and data, particularly in areas like privacy protection, misinformation, and digital power concentration. By providing a controlled environment, sandboxes enable authorities to assess the effectiveness of their regulatory measures and develop capacities to effectively tackle these major regulatory questions. However, there are ongoing debates about whether regulatory sandboxes alone are enough to develop the necessary capacities, and whether expensive and time-consuming sandboxes are beneficial for all authorities.

The value of data is highlighted as an important consideration in future discussions regarding regulatory sandboxes. The experiences of Latin American governments, who have been studying the Singaporean Sandbox, have been particularly influential. The Singaporean Sandbox is regarded as pivotal and offers a balance between flexibility, responsibility, and unlocking data value. By studying its implementation, other countries can gain insights into how to effectively leverage data and strike the right balance between innovation and regulation.

In addition to addressing AI and data concerns, sandboxes also play a crucial role in tackling misinformation. They provide a flexible and neutral space for collaboration between companies, governments, and civil societies to explore and develop effective measures to address the harmful impact of misinformation. By fostering interaction, investigation, and the exchange of ideas, sandboxes serve as a stepping stone towards implementing robust regulatory measures.

Advocates stress the importance of a multi-stakeholder approach in tackling misinformation, involving civil societies, companies, and governments. Civil societies, in particular, have been recognized for their valuable contributions in this area. By working together, these stakeholders can collaboratively develop effective strategies to combat misinformation and promote responsible information sharing.

Overall, regulatory sandboxes are regarded as valuable tools in building trust and understanding before introducing regulatory measures. They create a space for experimentation and collaboration, allowing authorities to assess the impact, feasibility, and effectiveness of their regulations. However, caution must be exercised in terms of their costs and effectiveness. It is crucial for countries to consider their individual capacities and circumstances before implementing sandboxes as a regulatory solution.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more