Safe Digital Futures for Children: Aligning Global Agendas | IGF 2023 WS #403

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Albert Antwi Boasiako

Ghana has made significant progress in integrating child protection into its cybersecurity efforts. The country has passed the Cybersecurity Act, which focuses on child online protection. Additionally, Ghana has established a dedicated division within the Cybersecurity Authority to protect children online. This demonstrates Ghana’s commitment to ending abuse and violence against children, as highlighted in SDG 16.2.

Furthermore, Ghana has seen a remarkable improvement in its cybersecurity readiness, with a rise from 32.6% to 86.6% between 2017 and 2020. This progress aligns with SDG 9.1, which aims to build resilient infrastructure and foster innovation.

Research and data have played a crucial role in shaping Ghana’s cybersecurity policies and laws. Through research, Ghana has identified the challenges faced by children accessing inappropriate content online, leading to more comprehensive child protection strategies. This highlights the importance of evidence-based decision-making, as emphasized in SDG 9.5.

However, Ghana has faced challenges in implementing awareness creation programs, particularly in reaching a larger percentage of the population. With a population of 32 million children, Ghana has only achieved around 20% of its awareness creation goals. Overcoming this challenge is crucial in combating cyber threats effectively.

Fragmentation within governmental and non-governmental spaces has been a significant obstacle in child online protection efforts in Ghana. To address this, Ghana needs to institutionalize systematic measures and promote collaboration among stakeholders. This will ensure a unified approach and enhance response effectiveness.

Albert Antwi Boasiako, a proponent of child protection, advocates for the integration of child protection into national cybersecurity frameworks. Albert emphasizes the importance of research conducted with UNICEF and the World Bank in shaping cybersecurity policies, aligning with SDG 16.2.

Public reporting of incidents is also essential for maintaining cybersecurity, as supported by Albert. The establishment of the national hotline 292 in Ghana has proven effective in receiving incident reports and providing guidance to the public. This aligns with SDG 16.6’s objective of developing transparent and accountable institutions.

Implementing cybersecurity laws can pose challenges, particularly in certain developmental contexts. Factors like power concentration and specific country conditions can hinder their practical application. Overcoming these challenges requires continuous effort to ensure equal access to justice, as outlined in SDG 16.3.

In the African context, achieving uniformity in cybersecurity strategies is crucial. Discussions on streamlining online protection and combating cyberbullying in Africa are vital for better cooperation and enhanced cyber resilience across the continent.

Ghana supports regional integration for successful cybersecurity implementation, sharing its expertise with other countries. However, fragmentation within the region remains a challenge that needs to be addressed for effective collaboration and coordination in countering cyber threats.

In conclusion, Ghana’s efforts to incorporate child protection, improve cybersecurity readiness, and promote evidence-based decision-making are commendable. Overcoming challenges related to awareness creation, fragmentation, law implementation, and regional integration will contribute to a more secure digital environment for children in Ghana and beyond.

Marija Manojlovic

Online child safety is often overlooked in discussions surrounding digital governance, which is concerning as protecting children from online harm should be a priority. This issue is further exacerbated by a false choice that is frequently posed between user privacy and online safety. This notion that one must choose between the two is flawed and hinders progress in safeguarding children in the digital realm.

The fragmentation within the digital ecosystem hampers progress in advancing child online safety. Marija, a leader in the field, has observed that collaboration and coordination among various stakeholders, including governments, the private sector, and academia, are crucial. However, there is an alarming level of fragmentation that impedes progress and the development of effective strategies to ensure children’s safety online.

One positive aspect that emerges from the discussions is the recognition that failures and learnings should be shared openly. Marija proposes that companies and organizations not only share what has worked but also what has failed. Transparency and the sharing of experiences can lead to better solutions and a more cooperative approach to addressing online safety challenges.

To truly drive change, it is essential to understand the root causes of digital challenges. Marija suggests moving upstream and examining the design and policy choices that contribute to online safety issues. This entails exploring how societal norms and technological design enable child exploitation, gender-based violence, and other online hazards.

Creating a unified digital agenda is crucial for maximizing the benefits of digital technologies and ensuring online safety for children. Misalignment in digital agendas can hinder progress, but engaging in meaningful discussions and sharing innovative solutions can help establish an internet environment that is beneficial for all, particularly children.

An evidence-focused and data-informed approach is necessary to effectively protect children online. Marija emphasizes the significance of testing, experimentation, and the sharing of results to inform decisions and shape policies. Building evidence through a cooperative spirit between different stakeholders is key.

Ghana serves as a unique example where child protection has been institutionalised in their cybersecurity work. This highlights the importance of countries actively integrating child protection into their cybersecurity strategies and policies.

However, it is disheartening to see that the innovation ecosystem is not always inclusive of individuals who require safety measures due to various reasons, including concerns for their well-being. This exclusion reinforces the need to address safety concerns to create a more inclusive and diverse innovation ecosystem.

The intersection of online child safety, inclusive digitisation, and gender balance should not be disregarded. Ensuring online safety is crucial for promoting inclusivity and achieving gender equality in the digital realm.

More work needs to be done in preventing gender-based violence and image-based abuse online. These serious issues require attention and effective strategies to protect individuals from harm.

Additionally, it is essential to challenge and address the prevailing narratives and perceptions of these digital challenges that are rooted in gender norms. Overcoming these deeply ingrained biases and stereotypes is crucial for creating a safer and more equitable online space.

While the internet presents numerous opportunities for young people, their participation and protection must be prioritised. Their experiences and perspectives need to be recognised and incorporated into decision-making processes to ensure their safety and well-being.

Moreover, it must be ensured that existing vulnerabilities, such as the gender divide, toxic masculinity, and extremism, are not exacerbated in the online world. Digital platforms should actively work towards a safer and more inclusive environment that nurtures positive interactions and discourages harm.

Lastly, increased investment in the field of online safety and protection is needed. Governments, industry leaders, and other stakeholders must allocate resources and finances towards robust initiatives that safeguard children from online threats.

In conclusion, addressing online child safety is essential and should not be overlooked within the digital governance discourse. It is imperative to dispel the false dichotomy between user privacy and online safety, overcome fragmentation, and foster collaboration among diverse stakeholders. Sharing successes and failures, understanding the root causes of digital challenges, building a unified digital agenda, adopting an evidence-focused and data-informed approach, institutionalising child protection, promoting inclusivity, challenging gender norms, ensuring youth participation and protection, and increasing investment in online safety are all integral to creating a safer and more inclusive digital environment for all, particularly children.

Mattito Watson

The analysis examines four speakers discussing various aspects of USAID’s strategies and initiatives related to youth and digital experiences. Firstly, it is noted that USAID’s digital strategy was released in 2020, indicating their adoption of digital technologies in development practices. As one of the largest development organizations globally, this digital adaptation is significant in terms of reach and impact.

Additionally, USAID has implemented a child protection strategy, demonstrating their commitment to safeguarding children’s well-being. Mattito Watson, who leads the child protection efforts within USAID’s child, children, and adversity team, plays a key role in this area. Moreover, USAID has a youth strategy that emphasizes collaboration and partnership with young people, rather than a paternalistic approach.

The analysis highlights the importance of involving youth in decision-making processes. To facilitate this involvement, USAID established a digital youth council, which serves as an advisory body and nurtures future leaders. The council consists of 12 members, including a gender-balanced representation of seven girls and five young men, underscoring USAID’s commitment to inclusivity.

Understanding the digital experiences of youth is vital. Mattito Watson’s efforts to comprehend the digital experiences of different youth demographics have led to the establishment of the Digital Youth Council, reinforcing the commitment to engage and empower young people.

In conclusion, the analysis reveals USAID’s strategies and initiatives to involve youth and incorporate digital experiences. The release of the digital strategy, implementation of child protection and youth strategies, and the establishment of the digital youth council showcase USAID’s efforts to stay relevant and foster inclusive development practices. By recognizing the importance of involving youth and understanding their digital experiences, USAID is taking a forward-thinking approach that can drive positive change and reduce inequalities in line with the Sustainable Development Goals (SDGs).

Andrea Powell

The internet has brought both great opportunities and risks for children. On one hand, children now have more access than ever to knowledge, entertainment, and communities, empowering them in various ways. However, there are also troubling aspects of cyberspace, with the dark web being used for criminal activities.

In terms of digital diplomacy and internet laws, there is a call for coherence. The belief is that everything that is forbidden in real life should also be forbidden online, and everything guaranteed offline should also be guaranteed online. Efforts have been made to implement this belief, such as discussions on how to apply the UN Charter or Geneva Convention within a conflict.

Solutions to digital challenges should come from a cooperative effort involving all stakeholders. Governments, companies, civil society organizations, and researchers all have different responsibilities and prerogatives that can contribute to problem-solving in the digital sphere.

One pressing issue is the lack of attention and resources given to child protection online compared to other areas. The field of child protection online is weaker, with less funding and organization, especially in comparison to efforts against terrorist content.

Creating an environment where there is effective testing and sharing of solutions to digital issues, such as age verification, is crucial. Different approaches to age verification exist, each with different levels of privacy, efficiency, and centrality. Finding the right balance is important.

Image-based sexual violence is a growing global issue that disproportionately affects vulnerable groups. There are over 3,000 websites designed to host non-consensually shared intimate videos, and young people are increasingly exposed to this form of violence. Survivors often experience psychological distress, trauma, anxiety, and even suicidal thoughts. Shockingly, over 40 cases of child suicide as a result of image-based sexual violence have been uncovered.

There is a need for better knowledge and public awareness of image-based sexual violence. Most law enforcement agencies lack knowledge of the issue, and public misunderstandings perpetuate victim-shaming attitudes. Global regulation and policies need to be harmonized to tackle this issue effectively. Barriers to addressing the issue include the need to prove the intent of the abuser, and it is argued that online sexual violence should be classified as a serious crime.

Tech companies are also called upon to take more accountability and engage proactively. Currently, there are over 3,000 exploitative websites that could be de-indexed, and survivors are left to remove their own images, effectively cleaning up their own crime scenes. Tech companies should play a more active role in preventing and dealing with image-based sexual violence.

In order to support victims of image-based sexual violence, global standardization of support hotlines is necessary. The InHope Network provides a model of global hotline support for child online sexual abuse, and this approach could be expanded to address the needs of victims of image-based sexual violence.

In conclusion, while the internet provides numerous opportunities for children, it also poses risks that need to be addressed. There is a call for coherence in digital diplomacy and internet laws, solutions to challenges should involve a cooperative effort from all stakeholders, child protection online requires more attention and resources, image-based sexual violence is a pressing global issue that demands better knowledge and regulation, tech companies should be more accountable, and global standardization of support hotlines is crucial.

Henri Verdier

The analysis examines topics such as online crime, the dark web, internet fragmentation, internet companies, innovation, security and safety, and violence and gender issues. It reveals that a significant portion of online crime occurs on the dark web rather than social networks, with real-time videos of crimes for sale. To combat this, the analysis suggests increasing police presence, investment, and international cooperation. It also highlights the issue of internet fragmentation at the technical layer, which needs to be addressed. Additionally, there is a disparity in trust and safety investment by internet companies, with greater investment in larger markets and less in smaller ones, especially in Africa. The analysis argues for equalizing trust and safety investment. Market concentration is also opposed, with a call for a more balanced approach to internet companies. Contrary to popular belief, the analysis argues that innovation and regulation can coexist, with regulations sometimes driving innovation. Furthermore, the analysis emphasizes that security, safety, and innovation are not mutually exclusive, and solutions can be found by considering all three. The analysis also explores the interconnectedness of violence and gender issues, noting that social networks play a role in radicalization and that violence often targets gender and minority groups. Ignoring gender issues can lead to overlooking other interconnected issues. In conclusion, the analysis provides a comprehensive examination of various topics and offers valuable insights for addressing these complex issues.

Cailin Crockett

The analysis highlights unanimous agreement among the speakers on the importance of addressing gender-based violence, particularly online violence. They argue that all forms of gender-based violence stem from common root causes and risk factors, often driven by harmful social and gender norms. Furthermore, they emphasize that these crimes are majorly underreported.

The Biden-Harris administration strongly supports efforts to end all forms of gender-based violence. They have taken a comprehensive approach to tackle the issue, including setting up a White House Task Force dedicated to addressing online harassment and abuse. This demonstrates their commitment to promoting accountability, transparency, and survivor-centered approaches with a gender lens. The administration acknowledges that gender-based violence has ripple effects on communities, economies, and countries.

In combating online violence, the speakers underline the importance of prevention, survivor support, accountability for both platforms and individual perpetrators, and research. These pillars form the basis of the strategy against online violence. The task force comprises various government departments, such as USAID, the Justice Department, Health and Human Services, Homeland Security, and more. The Biden-Harris Administration has already outlined 60 actions that federal agencies have committed to taking to address online harassment and abuse.

The speakers note that the United States’ federalist nature leads to multiple approaches being taken across different states and territories to address abuse issues. This diversity reflects the unique challenges and needs of each region. Additionally, they assert the need to balance the interests of children with the rights of parents, as parents may not always be inherently able or willing to represent the best interests of their children.

Investing in prevention and adopting an evidence-informed approach are crucial in addressing gender-based violence. The administration recognizes the importance of maximizing options and support for survivors of abuse to effectively prevent and combat violence.

The CDC’s analysis, titled ‘Connecting the Dots’, aims to identify shared causes of violence across the lifespan. This research contributes to a better understanding of the various forms of interpersonal violence and helps inform prevention strategies.

Finally, the speakers call on civil society to demand government investment in tackling these issues. They emphasize the importance of allocating resources to effectively combat gender-based violence and online violence. This partnership between civil society and the government is crucial for making progressive changes and achieving the goal of ending all forms of violence.

Overall, the analysis emphasizes the urgent need to address gender-based violence, with particular emphasis on online violence. It acknowledges the comprehensive measures taken by the Biden-Harris administration and stresses the significance of prevention, survivor support, accountability, and research. The speakers’ insights shed light on the diverse approaches taken across the United States and highlight the importance of balancing the rights of children with the rights of parents. Investing in prevention and evidence-informed policy is considered essential, and the CDC’s efforts to identify shared causes of violence are valued. Lastly, civil society plays a vital role in advocating for government resources to effectively combat these issues.

Salomé Eggler

The extended summary of the analysis highlights the significant role played by GIZ in integrating child online safety into its projects. GIZ is committed to incorporating child online safety from the outset of its projects, ensuring that the protection of children in the digital space is a top priority. This proactive approach underscores GIZ’s commitment to safeguarding children’s rights and well-being.

Furthermore, GIZ takes a comprehensive approach to ensure child online safety is embedded in every aspect of its projects. By integrating safety requirements at every stage, GIZ creates genuine child online safety projects specifically designed to address the unique challenges and risks faced by children online. This holistic approach is crucial in effectively protecting children from online threats and promoting their digital well-being.

To aid in the implementation of child online safety, GIZ utilises user-friendly tools that do not require extensive expertise in child protection. The Digital Rights Check tool is one such example, helping to assess projects in terms of human rights considerations, including child online safety. This tool allows GIZ to evaluate the extent to which its projects uphold fundamental rights and make necessary adjustments to ensure the protection of children’s rights.

However, the analysis highlights the challenges faced in implementing child online safety. Various cross-cutting issues, such as gender, climate change, and disability and inclusion requirements, need to be balanced with child safety considerations. This requires GIZ practitioners to find a delicate balance between these competing priorities to ensure that child online safety is not compromised. Moreover, limited budgets and time constraints further complicate the implementation process.

Nevertheless, the analysis indicates that increasing digitalization projects present an opportunity to mainstream child online safety. As GIZ’s digital projects continue to expand, there is a chance to incorporate child online safety into more frameworks and tools. By leveraging the digital rights check and other appropriate measures, GIZ can ensure that child protection considerations are integrated into larger projects, leading to a safer online environment for children.

Overall, the sentiment towards GIZ’s efforts in integrating child online safety is positive. GIZ’s commitment to embedding child online safety into its projects and using tools to assess projects in terms of human rights, including child online safety, demonstrates a proactive approach towards protecting children’s rights in the digital age. However, the challenges associated with implementing child online safety, along with limited resources, highlight the need for ongoing commitment and collaboration to overcome these obstacles.

In conclusion, GIZ’s role in integrating child online safety is crucial. By prioritising child protection from the outset of projects, adopting a comprehensive approach, utilising user-friendly tools, and capitalising on digitalisation opportunities, GIZ demonstrates its commitment to creating a safer online environment for children. Continued efforts, collaboration, and resource allocation are essential to overcome challenges and ensure the effective implementation of child online safety measures.

Moderator

Omar Farouk, in collaboration with UNICEF and the UN Tech Envoy, is actively involved in Project Omna, aiming to tackle pressing digital issues such as cybersecurity, bullying, and privacy on a global scale. The project is focused on addressing the challenges faced by children in the digital space and ensuring their safety.

The importance of balancing child safety and economic growth in the digital realm is a key aspect of the discussion. It is evident that as the world becomes increasingly interconnected, it is crucial to protect children from the potential harms that exist online while fostering an environment that promotes economic growth and innovation.

One of the primary arguments put forward is the need for strong partnerships between government, businesses, and civil society to effectively address child safety in the digital space. Collaborative efforts among these stakeholders are crucial in developing strategies and implementing measures that protect children from online threats. By working together, they can leverage their respective expertise and resources to create a safer digital environment for children.

The summary highlights the related topics of child safety online, government-business partnerships, civil society, and the digital space. It is evident that these topics are intertwined and interconnected. Effective child protection in the digital space requires cooperation and collaboration among all these stakeholders.

Furthermore, the discussion emphasizes the role of partnerships in achieving one of the Sustainable Development Goals (SDG 17: Partnerships for the Goals). This demonstrates the global recognition of the importance of collaboration in addressing complex challenges like child safety online.

The summary does not mention any specific supporting facts or evidence. However, the involvement of UNICEF and the UN Tech Envoy in Project Omna provides a strong indication of the credibility and importance of the initiative. Additionally, the fact that the summary mentions the need for partnerships suggests that there is evidence supporting the argument for such collaborations.

In conclusion, the expanded summary highlights Omar Farouk’s involvement in Project Omna, undertaken in partnership with UNICEF and the UN Tech Envoy, to address critical digital issues. The discussion emphasizes the necessity of balancing child safety and economic growth in the digital space and calls for strong partnerships between government, businesses, and civil society. By working together, these stakeholders can effectively tackle the challenges faced by children online and create a safer digital environment for all.

Julie Inman Grant

The issue of online safety for children is a significant concern that requires attention. Children make up one-third of global internet users, and they are considered more vulnerable online. The sentiment towards this issue is mainly negative, with arguments emphasising the need for safety measures and awareness to protect children.

One argument highlights that the internet was not designed for children, and thus, their safety should be considered. This emphasises the negative sentiment regarding the lack of adequate safeguards for children online. The related Sustainable Development Goal (SDG) is 3.2, which aims to end preventable deaths of newborns and children.

Another argument focuses on the long-term impacts of children becoming victims of online abuse. Victims of child abuse are more likely to experience sexual assault, domestic violence, mental health issues, and even become offenders themselves. This negative sentiment highlights the serious societal costs associated with online abuse of children. The related SDGs are 3.4, which promotes mental health and well-being, and 5.2, which aims to eliminate all forms of violence against women and girls.

Education and awareness are seen as crucial factors in addressing online safety for children. The positive sentiment is observed in the argument that prioritising education and awareness regarding internet safety is essential. Programmes and initiatives aimed at parents and young people demonstrate the commitment to promoting safety. The related SDG is 4.7, which focuses on education for sustainable development and global citizenship.

The inadequacy of age verification on online platforms is highlighted, with a negative sentiment towards platform responsibility. The argument is that platforms need to improve age verification, as even eight and nine-year-olds are reporting cyberbullying. It is emphasised that young children lack the cognitive ability to handle risks on such platforms. The related SDG is 16.2, which aims to end abuse, exploitation, trafficking, and violence against children.

The importance of developing technology with human safety, particularly children, as a core consideration is emphasised. The positive sentiment is expressed in the argument that the welfare of children should be considered from the beginning of technology development. Anticipating and mitigating risks is crucial to ensure their safety. The related SDGs are 9.5, which promotes enhancing scientific research and technological capabilities, and 16.2, which aims to end abuse, exploitation, trafficking, and violence against children.

The effectiveness of self-regulation in dealing with cyberbullying and image-based abuse is questioned, expressing a negative sentiment. It is argued that self-regulation is no longer effective, with evidence suggesting a 90% success rate in removing cyberbullying content and image-based abuse. The related SDG is 16, which focuses on peace, justice, and strong institutions.

Cooperation between regulatory bodies and industry is advocated as necessary for prevention, protection, and proactive and systemic change. The positive sentiment is observed in the argument that such cooperation is essential to effectively address the issue. Initiatives and networks have already been established to work together in removing abusive content. The related SDG is 17, which emphasises partnerships for achieving goals.

It is noted that there is no need to start from scratch when building regulatory models for online safety, expressing a positive sentiment. The argument is that localized materials have been developed in multiple languages to ensure wider accessibility, and sharing experiences, including mistakes, can help prevent future harm. The related SDG is 16, which focuses on peace, justice, and strong institutions.

Lastly, it is argued that online safety must be a collective responsibility, reflecting a positive sentiment. The argument emphasizes that no one will be safe until everyone is safe. This highlights the importance of individuals, communities, and organizations working together to ensure online safety for all. The related SDG is 16, which focuses on peace, justice, and strong institutions.

In conclusion, the importance of online safety for children is a pressing issue. The negative sentiment arises from concerns over their vulnerability and the long-term impacts of online abuse. Education and awareness, improved age verification, technology development with child safety in mind, and cooperation between regulatory bodies and industry are crucial for prevention and protection. The limitations of self-regulation are observed, and the need for collective responsibility is emphasized. Addressing these issues is vital to ensure a safer online environment for children.

Audience

During the discussion on the protection of children’s rights, several key points were raised by the speakers. One speaker emphasised the need to draw practical measures to prioritise child rights. This is particularly important in addressing issues such as abuse, exploitation, trafficking, and violence, which are central to SDG 16.2. The speaker highlighted their work at the Elena Institute, a child rights organisation, and their involvement in the Brazilian Coalition to End Violence.

Another speaker emphasised the importance of laws and design in avoiding fragmentation and effectively implementing new ideas. This is crucial in the context of child rights, as effective implementation requires a holistic approach. The speaker did not provide any specific supporting facts for their argument, but the need for coordination and coherence in policy and legislation is broadly recognised in this field.

The discussion also touched upon the need for better cybersecurity strategies and laws to protect online users, especially in African countries. The speaker highlighted the progress made by Ghana in this regard and stressed the importance of addressing cybersecurity in the context of digital inclusion and progress. They suggested gathering best practices and suggestions at both the national level and civil society level to combat issues such as cyberbullying.

There were also concerns expressed about balancing parental supervision tools with a child’s right to information and seeking help. The speakers pointed out the high rates of online abuse in Brazil, and the potential risks of violence coming from within the family, highlighting the need for caution with supervision tools.

The debate over prevention measures, such as sexual education, in conservative countries was mentioned as well. The discussion highlighted the challenges faced in advocating for such strategies, as they can be seen as taboo in conservative countries. The importance of finding practical approaches to deal with child abuse and exploitation, while considering cultural and social contexts, was emphasised.

In conclusion, the discussion emphasised the importance of practical approaches in safeguarding children’s rights. It called for the development of effective strategies and laws to address issues such as abuse, exploitation, and violence in both physical and online contexts. It highlighted the need for coordination, coherence, and best practices at multiple levels, including national and civil society. The debate also shed light on the challenges of balancing parental supervision tools with a child’s right to information and the difficulties in advocating for prevention strategies in conservative countries. Overall, the discussion underscored the need for comprehensive and contextually sensitive approaches to protect and promote children’s rights.

Ananya Singh

The USAID Digital Youth Council plays a crucial role in involving youth in digital development. The council has been created by USAID to ensure that the voices of young people are incorporated in the implementation of their digital strategy. They provide a platform for youth to have their voices heard and influence the development strategies. This initiative is aligned with SDG 4: Quality Education and SDG 8: Decent Work and Economic Growth.

The speaker, who is part of the USAID Digital Youth Council, actively works towards providing the platform for youth to have their voices heard and influence development strategies. This highlights the importance of giving young people a voice in shaping digital development. The sentiment is positive towards this argument, as it recognises the need for youth to have a platform to be heard.

Furthermore, the council has been instrumental in guiding the implementation of the USAID’s digital strategy and raising awareness about digital harms. They have co-created sessions on emerging technologies, which indicates their active involvement in shaping the digital landscape. This is in line with SDG 9: Industry, Innovation, and Infrastructure, and SDG 17: Partnerships for the Goals.

Moreover, the council members have designed apps to educate young people about digital harms, showcasing their creativity and commitment to addressing challenges in the digital world. This demonstrates the council’s dedication to empowering young people and equipping them with the necessary knowledge to navigate the digital space safely.

Involving youth in decision-making processes has been found beneficial, and the Digital Youth Council exemplifies this. Ananya Singh, a member of the council, was allowed to share the stage with USAID administrator and U.S. Congress representatives, indicating the recognition and importance given to the council’s involvement. Additionally, young council members were involved in planning and speaking at multiple sessions of the USAID at the Global Digital Development Forum, further highlighting their active participation in decision-making processes. This aligns with SDG 16: Peace, Justice, and Strong Institutions.

Overall, the Digital Youth Council’s work has been a success story in empowering youth and promoting digital engagement. By providing a platform for young people’s voices to be heard, guiding the implementation of digital strategies, raising awareness about digital harms, and actively participating in decision-making processes, the council is contributing to the advancement of SDGs and ensuring that youth are active and equal partners in digital development.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Quantum-IoT-Infrastructure: Security for Cyberspace | IGF 2023 WS #421

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Wout de Natris

The lack of cybersecurity measures in Internet of Things (IoT) devices is a pressing issue that demands attention. While the technical community has made efforts to address this concern, the majority of governments and industries have not yet prioritised security by design in IoT. This oversight has resulted in widespread vulnerability and the potential for malicious attacks.

Initially, cybersecurity was not a concern during the early days of the internet, as worldwide connectivity was limited. However, with the rapid expansion and integration of IoT devices into our daily lives, the need for robust security measures has become increasingly evident. Unfortunately, IoT devices are often designed without adequate security measures, making them susceptible to cyber threats and potentially compromising users’ personal data.

One argument put forth is that governments and large corporations should play a crucial role in setting the standard for security in IoT. An example of this proactive approach is seen in the Dutch government, which has taken the lead by imposing the deployment of 43 different security standards. This demonstrates the importance of demanding high levels of security in IoT devices.

Another concerning aspect is the lack of rigorous security testing before new technology, including ICT, enters the market. The fast pace of innovation and the urgency to bring products to market often result in inadequate security measures. It is argued that security should be a fundamental consideration and undergo formal testing before any form of ICT is released, minimising risks for users.

On a more positive note, international cooperation and information sharing are emphasised as pivotal factors in staying ahead in terms of cybersecurity. The power of the internet lies in its ability to facilitate global discussions, enabling the sharing of knowledge and experiences across borders. Governments and larger industries need to be made aware of their role and potential influence in addressing cybersecurity challenges, fostering collaboration and cooperation on a global scale.

In conclusion, the lack of cybersecurity measures in IoT devices poses a significant challenge that needs to be addressed urgently. Efforts from both the technical community and various stakeholders are required to push for security by design and the implementation of robust standards. Governments and large corporations hold the responsibility of leading the way, setting the standards for security in IoT. In addition, rigorous security testing should become a prerequisite before any form of ICT is introduced to the market. Furthermore, international cooperation and information sharing are critical for staying ahead in the ever-evolving landscape of cybersecurity. Only through collaboration can we tackle the challenges and vulnerabilities inherent in the interconnected world of IoT.

Moderator – Carina Birarda

This extended summary highlights the main points and arguments presented in the given information on cybersecurity. It also provides more details, evidence, and conclusions drawn from the analysis.

The first argument states that there has been a significant increase in cybersecurity incidents at the international level, which is viewed as a negative trend. This can be attributed to the global connectivity that has become a key factor behind this increase. Additionally, the emergence of sophisticated criminal activities, such as crime as a service, has further contributed to the rise in cybersecurity incidents. The supporting evidence for this argument is the fact that cyberattacks are often conducted by actors in multiple countries, indicating the global nature of the issue.

The second argument emphasizes the fundamental challenge of adopting internationally-recognised cybersecurity best practices. It is highlighted that only a few organisations currently practise these standards, and the lack of adoption is a global issue. The evidence supporting this argument includes the observation that just a small number of organisations implement these best practices, indicating a need for widespread adoption to enhance cybersecurity at both national and international levels.

The third argument stresses that cybersecurity is a global issue that necessitates international collaboration for effective mitigation. The fact that cyberattacks do not respect borders or jurisdictions is put forward as evidence for the need for international cooperation. Additionally, it is stated that information sharing at the international level is imperative for combating cybersecurity threats. This argument highlights the importance of collaboration between countries to establish a robust global cybersecurity framework.

The fourth argument suggests that understanding the threats facing IoT, web, and quantum technologies is essential for implementing proper cybersecurity practices. By gaining a comprehensive understanding of these threats, appropriate best practices can be selected and implemented. The evidence supporting this argument is the observation that proper implementation of cybersecurity practices can only be achieved by addressing the specific threats posed by emerging technologies.

In conclusion, the extended summary highlights the increasing number of cybersecurity incidents on an international scale as a negative trend. The adoption of internationally-recognised cybersecurity best practices is identified as a fundamental challenge, with only a small number of organisations currently practising these standards. It is established that cybersecurity is a global issue requiring international collaboration for effective mitigation. Understanding the specific threats posed by emerging technologies is emphasised as crucial for implementing proper cybersecurity practices. Overall, the analysis underscores the need for international cooperation and comprehensive measures to address the growing cybersecurity challenges.

Maria Luque

Quantum technologies, specifically quantum computing, present challenges and opportunities in terms of cybersecurity. The concern is that quantum computing has the potential to break current cryptographic systems and expose sensitive information. To combat this threat, researchers are developing technologies like Post-Quantum Cryptography (PQC) and Quantum Key Distribution (QKD). PQC, although not yet standardized, can be applied today as a software-based solution, while QKD requires substantial investment and the creation of new secure communication infrastructures.

It is argued that governments and the technology industry need to continuously and significantly invest in quantum technologies to ensure data security in the face of the quantum threat. QKD, in particular, requires high investment and the establishment of entirely new infrastructures for secure communication. On the other hand, tech companies have already started implementing PQC into their solutions, showing their recognition of the need to adapt to quantum technologies.

Organizations also need to assess and adapt their information security structures to prepare for the quantum threat. They should understand their information architectures, level of encryption, and capabilities necessary for transitioning to quantum security. The approach for organizations may vary depending on their size, with smaller ones potentially adopting PQC and larger ones engaging in quantum communication networks.

For small tech companies, the infrastructure provided by large tech companies like AWS, Microsoft Azure, and Google is crucial for addressing the challenges posed by quantum technologies. These platforms serve as a foundation for smaller companies to navigate the complexities of quantum computing.

Deploying PQC algorithms in the cloud is considered a potential solution for securing data for small companies in the next five to ten years. Despite not being favoured by some, it is argued that deploying PQC algorithms in the cloud offers optimal data security for small companies. However, there is debate regarding this approach, with some opposing the practice for maintaining data security.

Countries are encouraged to focus on their strengths and specialties when planning their national quantum strategies. For example, Spain has chosen to invest in areas where it excels, such as optics and mathematics, to drive its quantum technology development.

In conclusion, quantum technologies pose both challenges and opportunities in cybersecurity. Addressing the quantum threat requires significant investments in quantum technologies, assessments and adaptations of information security structures, and consideration of alternative solutions like deploying PQC algorithms in the cloud. Additionally, countries should strategically focus on their strengths and specialities to plan effective national quantum strategies. Ongoing research and discussions are needed in this rapidly evolving field.

Olga Cavalli

Latin America faces unique technological and internet infrastructure challenges due to economic and distribution inequalities. These challenges stem from the disparities in wealth and resources within the countries of the region. As a result, access to and the quality of technology and internet infrastructure vary greatly across Latin America.

To address these challenges, there is a need for increased participation in policy dialogues related to the internet in Latin America. Olga Cavalli, a university teacher at the University of Buenos Aires, has played a key role in creating a training program for professionals to learn about the rules of the Internet, understand its challenges, and participate more actively in policy dialogues. This initiative aims to empower Latin American countries to have a stronger voice in shaping internet policies that are suitable for their specific needs and circumstances.

Furthermore, the rapid adoption of Information and Communication Technology (ICT) and Internet of Things (IoT) devices in Latin America has raised concerns about increased vulnerabilities due to the lack of initial security designs. It is estimated that there will be between 22,000 million to 50,000 IoT devices in the region next year. The fast pace of adoption leaves little time for proper security measures to be implemented, which could lead to potential breaches and threats in the future.

Argentina has taken proactive steps in addressing cybersecurity concerns. The national administration has implemented binding resolutions that require the preparation of a security plan, the assignment of a focal point for contact, and information sharing in the event of a cyber incident. Additionally, a manual has been developed to guide the national administration on how to respond to such incidents. A new cybersecurity strategy has also been approved, showcasing Argentina’s commitment to ensuring security in the digital realm.

Developing countries and small to medium enterprises (SMEs) face significant challenges in keeping up with rapid technological changes. These challenges include restrictions on importing certain products and hardware, as well as a lack of human resources, as trained professionals often migrate to developed countries in search of better opportunities. The combination of limited resources and a lack of technical expertise hampers their ability to understand and afford new technologies, creating a widening technology gap.

Moreover, developing economies and small to medium enterprises are often consumers of technologies developed elsewhere, which raises concerns about the global technology gap. While major technology companies like AWS, Microsoft Azure, and Google are expected to provide solutions based on emerging technologies like Post-Quantum Cryptography (PQC) algorithms and cloud computing, developing economies and SMEs rely on these technologies without actively contributing to their development. This dependence on technologies developed elsewhere puts them at a disadvantage.

To address these challenges, capacity building and awareness are advocated as essential measures. By investing in the development of local technological capabilities and creating awareness about the importance of technology, Latin American countries can reduce their reliance on technologies developed by other countries. This would help narrow the global technology gap and allow them to actively contribute to technological advancements that suit their specific needs.

In conclusion, Latin America faces unique challenges in technological and internet infrastructure due to economic and distribution inequalities. Increasing participation in policy dialogues, addressing cybersecurity concerns, and bridging the technology gap are crucial steps towards creating a more inclusive and technologically advanced region. Additionally, capacity building and raising awareness about technology will empower Latin American countries to shape their own technological future.

Nicolas Fiumarelli

During the discussion, the speakers emphasised the necessity of implementing security technologies, such as RPKI, DNSSEC, IoT security standards, and quantum-resistant algorithms, through legislation. They pointed out that the rising number of Internet of Things (IoT) devices and the advancements in quantum computing pose significant security risks. These risks can be mitigated by the adoption of robust security measures.

The speakers also highlighted the existence of security standards developed by the Internet Engineering Task Force (IETF) specifically for IoT devices. These standards provide guidelines and best practices to ensure the security of IoT networks and data. However, one speaker questioned why these security technologies are not universally enforced in all Information and Communication Technology (ICT) systems through legal obligations.

It was acknowledged that the implementation of advanced security technologies comes with a high cost. This cost may pose a challenge to widespread adoption. Nonetheless, the importance of safeguarding critical infrastructure and personal information against cyber threats and data breaches justifies the investment in these technologies.

Overall, the sentiment during the discussion was neutral, indicating a balanced examination of the topic. The speakers’ arguments and evidence provided a comprehensive understanding of the urgency to implement security technologies, alongside the challenges associated with their implementation. The discussion aligned with SDG 9: Industry, Innovation and Infrastructure, as it emphasised the need for secure and resilient ICT systems to support sustainable development.

Through this analysis, it becomes evident that the adoption of security technologies through legislation should be encouraged and prioritised. This will help ensure the protection of IoT devices and networks, while also addressing the growing threat of quantum computing to traditional encryption methods. Additionally, the development and enforcement of security standards can play a crucial role in enhancing cybersecurity practices across various industries.

In conclusion, the discussion underscored the significance of deploying advanced security technologies and standards to safeguard ICT systems. Although challenges such as high implementation costs exist, the speakers highlighted the urgency to address these concerns and apply security measures throughout the industry. By doing so, they aimed to emphasise the need for a comprehensive approach to cybersecurity, simultaneously addressing both technological advancements and legal enforcement.

Carlos Martinez

The discussion centres around the vital role of DNSSEC (Domain Name System Security Extensions) and RPKI (Resource Public Key Infrastructure) in securing the fundamental structure of the internet. These security protocols are instrumental in safeguarding the integrity and authenticity of DNS responses and BGP (Border Gateway Protocol) announcements, respectively.

DNSSEC and RPKI operate by utilising digital signatures to verify the legitimacy of DNS responses and BGP announcements. This verification process ensures that the network delivers data packets to the correct destination, maintaining the proper functioning of the internet. The speakers unanimously recognise the crucial importance of DNSSEC and RPKI, highlighting their shared responsibility in both signing and validation processes.

On a related topic, there has been a debate concerning the potential weakening of cryptographic algorithms and the inclusion of backdoors to enable access. However, Carlos, one of the speakers, expresses a negative sentiment towards this notion. He asserts that such actions would be unwise, potentially compromising the security of cryptographic systems. This viewpoint aligns with SDG 16, which focuses on ensuring peace, justice, and strong institutions.

A positive aspect discussed is that both DNSSEC and RPKI have algorithm agility built into their design. This feature ensures that they can adapt to incipient post-quantum cryptographic scenarios. Consequently, when post-quantum cryptographic algorithms are standardized, they can be effectively incorporated into DNSSEC and RPKI, providing continued security measures against quantum threats.

The debate also encompasses the challenge of mandating technology, with the speakers highlighting instances where such endeavors have proven unsuccessful. They note the issues surrounding cost and benefit discrepancies, particularly in the context of the Internet of Things (IoT) and DNSSEC/RPKI implementation. Furthermore, while post-quantum algorithms have been proposed, they have not yet achieved a satisfactory level of performance.

In conclusion, the speakers collectively emphasize the importance of DNSSEC and RPKI in securing the core infrastructure of the internet. Their positive sentiment towards the efficacy of these protocols underscores their significance in maintaining a properly functioning internet. Nonetheless, there is a negative sentiment towards weakening cryptographic algorithms, highlighting the potential risks associated with such actions. The speakers also acknowledge the need for flexibility and tailored approaches when addressing different technologies, rather than enforcing a one-size-fits-all mandate. Ultimately, this discussion highlights the ongoing challenges and complexities associated with internet security and the need for continued research and adaptation to effectively counter emerging threats.

Speakers

&

’Carlos

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Maria

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Moderator

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Nicolas

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Olga

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Wout

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Resilient and Responsible AI | IGF 2023 Town Hall #105

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Mariam Jobe

The Africa Youth Internet Governance Forum was recently held, highlighting the significant role of young people in shaping the digital future. The forum covered various topics, including cyber security, data privacy, digital inclusion, and the need for comprehensive data laws. One key argument was the lack of knowledge among young people about these important issues, emphasizing the need for educational outreach efforts.

The forum also emphasized the importance of internet access and digital literacy in underserved and rural communities. It recognized that improving internet access and digital literacy is crucial to ensuring equal opportunities and promoting socio-economic development.

Discussions addressed the issue of cyber crimes and the need for safe spaces to report such problems. The importance of an ethical framework surrounding artificial intelligence was also highlighted. It was noted that some countries lack comprehensive data laws, hindering their ability to effectively address cyber crimes.

An intergenerational session between the youth and Members of Parliament (MPs) fostered collaboration and highlighted the importance of government-youth partnerships. Involving young people in policy development and decision-making processes is crucial.

In conclusion, the Africa Youth Internet Governance Forum underscored the pivotal role of young individuals in shaping the continent’s digital future. Increased education and awareness, inclusivity, ethical considerations, and citizen participation were identified as crucial components. Internet access and digital literacy in underserved communities were recognized, along with the need for collaboration between the youth and the government. The forum provided a platform to address pressing issues and generate innovative solutions for Africa’s digital transformation.

Audience

The analysis covered a range of topics discussed by various speakers. The first speaker expressed a disagreement with the commonly held belief that advanced tech elements such as AI and blockchain are the keys to innovation and development. Instead, they emphasized the importance of isolating, understanding, and tackling diseases like COVID-19. The speaker pointed out their seven years of engagement with individuals afflicted with COVID-19 and emphasized the importance of isolation in dealing with such diseases. They considered AI and blockchain distractions when it comes to public health crises.

Another speaker focused on the role of traditional forms of innovation and governance in driving improvement. They highlighted the contributions of African engineers and economists who are actively tackling COVID-19. The speaker emphasized the crucial role played by telecommunications regulators and considered traditional forms of governance, such as the rule of law, essential for improvement.

The role of AI in technological advancement was also discussed by a speaker with 40 years of experience in technology. They cited the example of human genomics and how integration of technology did not eliminate medical jobs but enhanced precision medicine. The speaker viewed AI as just another technology that should be adapted and integrated, rather than feared.

Legislators’ role in adapting technology and their potential to get distracted by job loss fears were highlighted by another speaker, who was both a lawmaker and technologist. They emphasized the importance of focusing on adapting technology quickly to avoid being left behind.

The importance of sharing reports and learnings with the leadership of each respective National Assembly was emphasized by a participant who presented a report in Abuja. They urged not to turn legislative participation into a mere holiday or jamboree but to make meaningful contributions.

Another participant suggested the need for a directory of ongoing initiatives at the continental level to be shared among all parliamentarians. They mentioned learning about several initiatives at the continental level for the first time during the meeting.

The need for international development partners to customize their support based on the priorities of each country was emphasized by a participant. They believed that generic support often does not address the priorities of individual countries and asserted that each country should determine its own priorities and approach development partners accordingly.

Concerns were raised over the limited participation of African countries in hosting the Internet Governance Forum (IGF), with less than 20 out of 54 African nations being active in hosting it. The speaker expressed the need for African nations to be more involved and accountable in terms of hosting IGF.

The establishment of an accountability framework within IGF for multi-stakeholders and countries was advocated by a speaker. They urged the need for a mechanism to hold stakeholders accountable.

The need for a vision and strategic plan for growing and strengthening IGF within Africa was also highlighted by a speaker. They emphasized that having such a plan would be instrumental in achieving the goals of IGF.

The potential contribution of assistive technologies to the GDP was mentioned, highlighting the importance of utilizing these technologies to serve disabled communities.

It was noted that African meetings and conferences often neglect the discussion on disabled communities, indicating a lack of attention and inclusivity in these forums.

The utilization of traditional African communal values to ensure the realization of IGF goals was suggested by a speaker, emphasizing the importance of cultural context in achieving the goals.

Overall, the analysis highlighted the need for innovation, inclusive policies, and partnerships to achieve sustainable development goals. It shed light on the importance of integrating advanced technology responsibly, prioritizing country-specific priorities, and ensuring inclusivity in decision-making processes. The speakers’ perspectives provide valuable insights into various aspects of development, governance, and technology, contributing to the ongoing discourse on achieving sustainable development.

Martin Koyabe

The analysis provided covers several key points related to cyber capacity building and cybersecurity in Africa.

The first point discussed is the AU-GFCE collaboration project, which aimed to build resilience and ensure cyber capacity building within the continent. This project focused on three key areas: assessment of priorities for African countries regarding cyber issues, sustainability through investment in expertise, and establishment of institutional memory. The analysis highlights that significant investment has been made in digital infrastructure due to the increased demand for these services during the COVID-19 pandemic.

The next area of focus is the need to enhance security in Africa through investing in training and developing cyber skills. It is mentioned that protecting infrastructure is a high priority for African countries. The GFCE has established the Africa Cyber Experts Community, which consists of over 80 experts from 37 countries. Additionally, there is a call to facilitate opportunities and development of cyber skills for individuals in marginalized areas. The GFCE and AU have also established the network of African women in cyber.

The importance of political will and funding in boosting cybersecurity is emphasized in the analysis. It is noted that many projects in Africa lack sustainable funding or resources, leading to their discontinuation or inadequate sustainment after the primary funding ends. The analysis argues that countries need to internally invest in cybersecurity to ensure the sustainability of projects. Furthermore, there is a critical need for sensitization at various political and decision-making levels to enhance cybersecurity efforts.

The analysis also mentions an upcoming meeting in Ghana, where cybersecurity experts and capacity building development partners will discuss cyber-related issues. It is highlighted that this meeting is of significant importance as it is the first of its kind.

The situation of AFRINIC, an organization facing challenges and undergoing issues, is also addressed. The analysis mentions that AFRINIC is currently under litigation and requires the resolution of its problems. However, it is recommended to reserve extended comments on this situation and let the process take its due course.

Finally, the importance of sustaining mechanisms for auditing authentic organizations is emphasized. This is seen as crucial in ensuring the effectiveness and credibility of these organizations.

Overall, the analysis focuses on the need for cyber capacity building and cybersecurity in Africa, highlighting the importance of various factors such as collaboration, investment, political will, funding, and sustainability. It also provides insights into specific initiatives and challenges, contributing to a comprehensive understanding of the topic.

Chidi

The African IGF (AIGF) emphasises the importance of a multi-stakeholder approach to ensure its success. This approach involves collaboration from various stakeholders including government, civil society, academia, and the private sector. The AIGF recognises that for effective addressing of the challenges and opportunities of the digital landscape, involvement of all these stakeholders in decision-making is necessary.

Creating an enabling environment is a key factor for the success of the AIGF. This refers to the need for policies and regulations that support the growth of the digital economy and ensure equal access to digital technologies for all. It is also crucial to enforce instant cyber laws to protect individuals and organisations from cyber threats and ensure the security of digital systems.

In addition to an enabling environment and instant cyber laws, political will is essential for shaping the digital landscape. The AIGF highlights the importance of political leaders showing commitment to promoting digital inclusion and embracing technology for development. This includes providing necessary resources and support for digital initiatives.

Another important aspect discussed is the need for inclusivity and ethical AI principles. The AIGF argues that an inclusive digital environment should be created to ensure everyone benefits from technological advancements. This includes addressing the issues of digital divide and ensuring no one is left behind. The AIGF also highlights the importance of a legislative framework to promote ethical AI principles and prioritize inclusivity.

Nigeria is recognised as a country playing a pivotal role in shaping the trajectory of technological advancement. The country has put in place strategic objectives, initiatives, regulatory instruments, and platforms to foster the growth of the digital economy. Nigeria has also taken major steps towards harmonising rights of way, which are crucial for the development of ICT infrastructure.

However, Africa still faces challenges such as inadequate visibility of individual countries’ activities and insufficient collaborations within the African region. It is imperative for African countries to share information in real-time and work together to achieve their technological goals.

Investment in research and development for emerging technologies is seen as a fundamental step towards technological advancement. The AIGF urges stakeholders to seize the opportunity and increase research capacity to drive innovation and stay at the forefront of emerging technologies.

AFRINIC, responsible for managing internet resources in Africa, is mentioned to be in a state of crisis or dysfunctionality. This raises concerns about its impact on internet security and sustainability in Africa. The source of the internet, considered a commodity, lies with the IP networks.

Another key argument made is the importance of Africa taking charge of its internet infrastructure to maintain cybersecurity. The AIGF highlights the need for African countries to have control over their internet infrastructure to effectively combat cybersecurity issues. This requires strengthening internet governance and building strong institutions to ensure the security and stability of the internet.

In conclusion, the African IGF advocates for a multi-stakeholder approach, an enabling environment, instant cyber laws, and political will to shape the digital landscape. Inclusivity and ethical AI principles, backed by a legislative framework, are also considered essential. Nigeria plays a crucial role in technological advancement, but challenges such as inadequate visibility and insufficient collaborations persist. Investment in research and development is necessary, and concerns are raised about the crisis within AFRINIC and its impact on internet security in Africa. Taking charge of internet infrastructure is crucial for cybersecurity on the continent.

Moctar Seck

Africa is facing significant digital challenges that hinder its progress in the digital age. One of the main obstacles is the deficit of connectivity, with infrastructure issues preventing 6% of the African population from accessing the internet. This lack of connectivity acts as a barrier to economic development and social inclusion. To overcome this challenge, Africa needs to ensure that broadband is accessible to everyone on the continent by 2030, which would require substantial investment from the private sector.

Another crucial challenge is the gender digital divide. Presently, only 45% of females in Africa are connected to the internet, compared to 85% of males. Bridging this divide is essential for achieving gender equality in the digital era. It is worth noting that the internet market in Africa has the potential to reach $180 million by 2025, further highlighting the economic opportunities that can be unlocked by addressing the gender digital divide.

Furthermore, the lack of legal identity for 500 million Africans poses a significant obstacle to digital transformation. Without legal identification, individuals are unable to fully participate in the digital economy and access essential services. Resolving this issue is crucial to ensure that every African can benefit from the opportunities presented by the digital age.

Cybersecurity challenges are also prevalent in Africa, with the cost of cybersecurity issues amounting to 10% of the continent’s GDP. Additionally, terrorists are increasingly exploiting digital avenues, underscoring the need for robust cybersecurity measures to protect individuals and institutions in Africa.

While artificial intelligence (AI) presents opportunities for growth and innovation, it also brings challenges that require regulation. Africa’s young population, projected to constitute 70% of the continent’s population by 2050, needs to be prepared for advancements in AI. Implementing regulations around AI is necessary to harness its potential benefits while mitigating associated risks.

The Global Digital Compact, which will shape the future of digital development globally, necessitates African input to ensure equitable sharing of digital technology benefits. Active participation from Africa in shaping this compact is essential.

Resolving the AFIRINIC issue, considered of utmost importance, requires a meeting between the African Economic Community (AEC), the Economic Commission for Africa (ECA), and Smart Africa. The resolution of this issue is crucial for the development of the continent’s digital infrastructure.

Network access and control are vital for digital transformation, particularly for Africa’s large youth population, accounting for 42% of global youth. Lack of access and control stifles progress, hindering the continent from fully harnessing the potential of digital technologies.

The reliance on AI and its perpetual usage of network data raise concerns about privacy and security. Establishing a regulatory framework is important to address these issues and ensure responsible and ethical use of AI.

Capacity building for regulators is essential to keep up with rapid technological advancements, such as AI, blockchain, IoT, and nanotechnology. Regulators need to stay ahead of these developments and understand their implications to effectively safeguard users’ rights and interests.

The African Internet Governance Forum (IGF) is a growing multi-stakeholder forum where key issues related to digital technology are discussed. It distinctively differs from the World Summit on the Information Society (WSIS) forum, where government decisions are made. Increased participation from government, the private sector, and civil society in the African IGF is necessary for a more inclusive and comprehensive discussion on digital technology.

The organization of the IGF in Africa depends on the renewal of its mandate. The successful hosting of the IGF in Ethiopia highlights the potential for its further expansion in Africa. However, the renewal of its mandate by 2030 is crucial to ensure its continuity and effective contribution to digital governance in the region.

In conclusion, Africa faces significant digital challenges that need to be addressed for the continent to fully participate in the digital age. These challenges include the deficit of connectivity, the gender digital divide, the lack of legal identity, cybersecurity issues, opportunities and challenges posed by AI, and the need for capacity building for regulators. Active participation by Africa in shaping the Global Digital Compact is crucial, while the resolution of the AFIRINIC issue is of utmost importance. Furthermore, the African IGF provides a platform for important discussions on digital technology, and its expansion and inclusive participation are necessary for effective digital governance in Africa.

Sam George

The analysis focuses on discussions among speakers regarding various topics related to data policies and digital infrastructure in Africa. One key point highlighted is the important role played by parliamentarians in bridging the gaps between civil society, the technical community, and the government. By attending events such as the African School on Internet Governance (AfriSEEG) and the Internet Governance Forum (IGF), parliamentarians gain insights into the challenges and opportunities in the digital realm. They can then initiate or support the government in developing legislation to implement data policies.

Another crucial aspect emphasized is the need for harmonisation of data policies across African countries. The case of the Nigerian company Jumia operating in multiple African nations illustrates how challenges can arise without proper data flow across borders. Without harmonisation, these challenges can hinder the growth and development of businesses operating across countries. Therefore, speakers argue for the adoption of consistent and coordinated data policies across the continent to promote a conducive environment for cross-border data flow.

The importance of prioritising funding for digital infrastructure also emerged as a key point. In upcoming budgeting cycles, it is recommended to improve funding for digital public infrastructure. This infrastructure would serve as a secure space to house data and support the stability and growth of digital services in Africa. Given the increasing importance of digital technology in various sectors, adequate funding for digital infrastructure is seen as crucial for the continent’s socioeconomic development.

Regarding the intersection of state security and digital rights, a neutral stance is taken. While it is recognised that the state has the right to secure data, it should not infringe upon the digital rights of citizens. Striking a balance between these two aspects is necessary to ensure the protection and privacy of individuals’ data while maintaining an environment of national security.

Another noteworthy point is the significance of building the capacity of parliament members through civil society engagement. Deepening knowledge on legislative subjects and engaging with parliamentary portfolio committees are seen as important steps in empowering parliamentarians to effectively address the complex challenges of data policies and digital infrastructure.

Lastly, the analysis also highlights specific stances taken by some speakers. One speaker supports the implementation of the Automated Union (AU) data policy framework and emphasises the need for legislation to support its implementation. Additionally, the speaker suggests the importance of data policy harmonisation across the African continent.

Another speaker advocates for increased funding towards digital public infrastructure. The Parliamentary Network on Internet Governance aims to improve funding allocation, and it is noted that most parliaments will be resuming work in a few weeks, providing an opportunity to further push for increased funding.

In conclusion, the analysis highlights the key points and arguments made by speakers on various aspects of data policies and digital infrastructure in Africa. These include the vital role of parliamentarians, the need for harmonised data policies, prioritisation of funding for digital infrastructure, and the balance between state security and digital rights. Civil society engagement and capacity building for parliament members are also seen as crucial. The implementation of the AU data policy framework and increased funding towards digital public infrastructure are supported. Overall, the analysis provides valuable insights into the discussions surrounding data policies and digital infrastructure in Africa.

Moses Bayingana

Digital transformation is considered critical for Africa’s development and plays a significant role in achieving Agenda 2063 and the UN Sustainable Development Goals. The African Union Commission has developed strategies to drive digital transformation and boost Africa’s digital economy. Over the past decade, Africa’s contribution to GDP has increased from 1.5% to over 3% due to advancements in the digital sector. This growth highlights the potential for further economic development through increased digitisation.

To facilitate the digitisation process, the AU has adopted the AU Data Policy Framework to ensure the smooth flow of data. Moreover, support has been extended to Internet Governance Forum organisations, demonstrating the commitment to fostering a conducive environment for digital transformation.

Investing in Africa’s youth is crucial as they hold the potential to drive Africa’s digital economy. With approximately 60% of the continent’s population below the age of 25, Africa’s youth play a significant role in shaping its future. Additionally, it is projected that Africa’s population will reach 2.5 billion by 2050, further emphasising the importance of youth empowerment to harness their potential in the digital sector.

The need to bridge the digital divide is also addressed. Efforts are being made by the African Union Commission to develop strategies and frameworks to regulate digital transformation and ensure the continent’s digital future. The adoption of the AU Convention on Cyber Security and Personal Data Protection is a notable step in safeguarding Africa from cybercrime, as it is identified as a prime target due to its low awareness rate.

In terms of implementation, an institutional architecture and information framework have been devised to monitor the progress of the digital transformation strategy. Member states have nominated focal points for digital transformation, ensuring a collective and coordinated approach towards achieving the set goals. Engagement with all actors across the continent is planned to foster collaboration and support in the implementation process. Furthermore, a comprehensive evaluation is scheduled for 2025, which will provide insights into the progress made and identify areas that require further attention.

Finally, a consultative approach is being employed to grow the African Internet Governance Forum. Recognising the importance of partnerships, strategies are developed through a consultative process, and collaboration is maintained with the European Commission and other stakeholders.

In conclusion, Africa recognises the significance of digital transformation for driving development and achieving its strategic goals. With a focus on youth empowerment, bridging the digital divide, regulating digital transformation, and monitoring implementation, Africa is positioning itself for a prosperous digital future. The efforts of the African Union Commission, coupled with collaboration from key stakeholders, demonstrate the commitment to harnessing the power of digitisation for the benefit of the continent and its people.

Moderator

The African Internet Governance Forum (IGF) discussed various key topics related to internet governance in Africa, including the role of parliament members as a bridge between civil society, the technical community, and the government. It was emphasized that parliament members play a critical role in initiating or supporting government efforts to implement data policy frameworks. Harmonized data policies across African countries were also identified as necessary for seamless data management and operations of companies like Jumia. Furthermore, the forum highlighted the need to increase funding for digital public infrastructure, and the importance of civil society’s engagement with parliamentary portfolio committees for effective legislation. The pivotal role of youth in shaping the digital future was emphasized, as well as the need for advocacy for changes in the digital landscape involving all stakeholders. The forum also stressed the importance of improving internet access and digital literacy from grassroots levels, and the need for safe spaces to report cyber crimes and ethical frameworks tailored to the African context. Investment in Africa’s young generation for driving the digital economy and sustained funding for cybersecurity projects were identified as crucial. The African Network Information Centre (AFRINIC) dysfunctionality was acknowledged, while Nigeria’s readiness to host the global IGF was welcomed. The forum also highlighted the need to address the gap in internet penetration in Africa. Overall, the African IGF provided a platform for valuable discussions and emphasized collaboration, policy development, and investment in various areas of internet governance. The active monitoring of the digital transformation strategy for Africa was also highlighted as a positive step.

Lillian Nalwoga

The African Internet Governance Forum (IGF) has seen increasing interest and participation from African stakeholders. The effectiveness of the multi-stakeholder approach in the African IGF has become evident, with support from parliamentarians, ministers, and the private sector. The presence of the parliamentarian network and African Parliamentarian Symposium highlights the importance of collaboration in shaping internet governance in Africa. Additionally, governments and the private sector at the regional and national levels have shown interest in engaging with the IGF.

One key argument is the need to implement recommendations and discussions from the IGF at the regional and national levels. These recommendations, discussed in Choto and Abuja, should be applied to enhance internet governance practices across Africa.

There has been an increase in interest and participation of African stakeholders in the Internet Governance (IG) processes. Statistics from the host country show that 3,100 people registered for the IGF, both onsite and online. The eagerness of countries to host future forums indicates the growing importance of these conversations in Africa. This increasing interest reflects the recognition of effective internet governance’s impact on achieving Industry, Innovation, and Infrastructure (SDG 9) and Partnerships for the Goals (SDG 17) in Africa.

It is concluded that the IGF should continue to support and partner with African stakeholders, with significant support received from global partners through the UN IGF Secretariat. This support acknowledges Africa’s potential in the digital future and encourages collaboration and learning opportunities for the continent’s development.

In summary, the multi-stakeholder approach in the African IGF is effective and relevant. Implementing recommendations at regional and national levels is vital, considering the increasing interest and participation of African stakeholders in IG processes. Continued support and partnership between the IGF and African stakeholders are essential for the digital future of Africa.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Protecting children online with emerging technologies | IGF 2023 Open Forum #15

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Moderator – Shenrui LI

During the discussion on protecting children online, the speakers placed great emphasis on the importance of safeguarding children in the digital space. Li Shenrui, a Child Protection Officer from UNICEF China Council Office, highlighted the need for collective responsibility among various stakeholders, including governments, industries, and civil society, in order to effectively protect children from online harms. Shenrui stressed that it is not enough to rely solely on policies; education and awareness are also crucial elements in ensuring children’s safety online.

China is dedicated to leading the way in creating a safe digital environment for children globally. The Chinese government has introduced provisions to protect children’s personal information in the cyberspace. Additionally, the country has organised forums on children’s online protection for consecutive years, demonstrating their commitment to addressing this issue.

Xianliang Ren further contributed to the discussion by highlighting the importance of adaptability in laws and regulations for addressing emerging technologies. Ren recommended regulating these technologies in accordance with the law and suggested that platforms should establish mechanisms such as ‘kid mode’ to protect children from inappropriate content. This highlights the need for clear roles and responsibilities in the digital space.

Improving children’s digital literacy was also identified as a crucial aspect in protecting them online. The importance of education in equipping children with the necessary skills to navigate the digital world effectively was acknowledged.

The discussion also highlighted the significance of international cooperation in addressing the issue of children’s online safety. China has partnered with UNICEF for activities related to children’s online safety, demonstrating their commitment to working together on a global scale to protect children.

In conclusion, the discussion on protecting children online emphasised the need for collective responsibility, adaptable laws and regulations, improved digital literacy, and international cooperation. These recommendations and efforts aim to create a safe and secure digital environment for children, ensuring their well-being in the increasingly connected world.

Patrick Burton

Emerging technologies offer both opportunities and risks for child online protection. These technologies, such as BORN’s child sexual abuse material classifier, the Finnish and Swedish somebody initiative, and machine learning-based redirection programs for potential offenders, have proved valuable in combating online child exploitation. However, their implementation also raises concerns about privacy and security. Potential risks include threats to children’s autonomy of consent and the lack of accountability, transparency, and explainability.

To address these concerns, it is crucial to prioritize the collective rights of children in the design, regulation, and legislation of these technologies. Any policies or regulations should ensure the protection and promotion of children’s rights. States have a responsibility to enforce these principles and ensure that businesses comply. This approach aims to create a safe online environment for children while harnessing the benefits of emerging technologies.

The implementation of age verification systems also requires careful consideration. While age verification can play a role in protecting children online, it is essential to ensure that no populations are excluded from accessing online services due to these systems. Legislation should prevent the exacerbation of existing biases or the introduction of new ones. Recent trends indicate an increasing inclination towards the adoption of age verification systems, but fairness and inclusivity should guide their implementation.

Additionally, it is important to question whether certain technologies, particularly AI, should be built at all. Relying solely on AI to solve problems often perpetuated by AI itself raises concerns. The potential consequences and limitations of AI in addressing these issues must be carefully assessed. While AI can offer valuable solutions, alternative approaches may be more effective in some situations.

In summary, emerging technologies present both opportunities and challenges for child online protection. Prioritizing the collective rights of children through thoughtful design, regulation, and legislation is crucial to leverage the benefits of technology while mitigating risks. Age verification systems should be implemented in a way that considers biases and ensures inclusivity. Moreover, a critical evaluation of whether certain technologies should be developed is necessary to effectively address the issues at hand.

Xianliang Ren

There is a global consensus on the need to strengthen online protection for children. Studies have revealed that in China alone, there are almost 200 million minors who have access to the internet, and 52% of minors start using it before the age of 10. This highlights the importance of safeguarding children’s online experiences and ensuring their safety in the digital world.

In response to this concern, the Chinese government has introduced provisions for the cyber protection of children’s personal information. Special rules and user agreements have been put in place, and interim measures have been implemented for the administration of generative artificial intelligence services. These efforts are aimed at protecting the privacy and security of children when they engage with various online platforms and services.

There is a growing belief that platforms should take social responsibility for protecting children online. It is suggested that they should implement features like kid mode, which can help create a safer online environment for young users. By providing child-friendly settings and content filters, platforms can mitigate potential risks and ensure age-appropriate online experiences for children.

Additionally, it is argued that the development and regulation of science and technologies should be done in accordance with the law. This calls for ethical considerations and responsible practices within the industry. By adhering to regulations, technological innovations can be harnessed for the greater good while avoiding potential harm or misuse.

Improving children’s digital literacy through education and awareness is seen as crucial in tackling online risks. Schools, families, and society as a whole need to work together to raise awareness among minors about the internet and equip them with the knowledge and skills to recognize risks and protect themselves. This can be achieved by integrating digital literacy education into school curricula and empowering parents and caregivers to guide children’s online experiences.

Furthermore, it is important for the internet community to strengthen dialogue and cooperation based on mutual respect and trust. By fostering a collaborative approach, stakeholders can work together to address the challenges of online protection for children. This includes engaging in constructive discussions, sharing best practices, and developing collective strategies to create a safer digital environment for children.

In conclusion, there is a consensus that online protection for children needs to be strengthened. The Chinese government has introduced provisions for the cyber protection of children’s personal information, and there is a call for platforms to implement features like kid mode and take social responsibility. It is crucial to develop and regulate science and technologies in accordance with the law, improve children’s digital literacy through education, and promote dialogue and cooperation within the internet community. By taking these steps, we can create a safer and more secure online environment for children worldwide.

Mengyin Wang

Tencent, a prominent technology company, is leveraging technology to ensure the safety of minors and promote education. With a positive sentiment, Tencent places a strong emphasis on delivering high-quality content and advocating for the well-being of minor internet users. In line with their mission and vision, the company has initiated several key initiatives.

In 2019, Tencent launched the T-mode, a platform that consolidates and promotes high-quality content related to AI, digital learning, and positive content. This initiative aligns with Goal 4 (Quality Education) and Goal 9 (Industry, Innovation, and Infrastructure) of the Sustainable Development Goals (SDGs). The T-mode platform aims to provide a safe and valuable online experience for minors by curating content that meets strict quality standards.

To promote education and inspire learning, Tencent has taken significant steps. They released an AI and programming lesson series, offering a free introductory course to young users. This initiative aligns with Goal 4 (Quality Education) and Goal 10 (Reduced Inequalities) of the SDGs. The course is designed to cater to schools with limited teaching resources and aims to reduce educational inequalities.

Tencent has also partnered with Tsinghua University to organize the Tencent Young Science Fair, an annual popular science event. This event aims to engage and inspire young minds in science and aligns with Goal 4 (Quality Education) and Goal 10 (Reduced Inequalities) of the SDGs. Through interactive exhibits and demonstrations, the fair encourages the next generation to explore the wonders of science and fosters a love for learning.

In addressing the protection and development of minors in the digital age, Tencent has harnessed the power of AI technology. They compiled guidelines for constructing internet applications specifically designed for minors based on AI technology. This shows Tencent’s commitment to creating safe and age-appropriate digital environments for young users. Additionally, Tencent offered the Real Action initiative technology for free to improve the user experience, including children with cochlear implants. This initiative aligns with Goal 3 (Good Health and Well-being) and Goal 9 (Industry, Innovation, and Infrastructure) of the SDGs.

In conclusion, Tencent’s initiatives in ensuring minor safety online and promoting education demonstrate their commitment to making a positive impact. Their focus on providing high-quality content, offering free AI and programming lessons, organizing the Tencent Young Science Fair, compiling guidelines for internet applications, and enhancing accessibility for individuals with cochlear implants showcases their dedication to the protection and development of minors in the digital age. Through these initiatives, Tencent is paving the way for a safer and more inclusive online environment for the younger generation.

DORA GIUSTI

The rapidly evolving digital landscape poses potential risks to children’s safety, with statistics showing that one in three internet users are children. This alarming figure highlights the vulnerability of children in the online world. Additionally, the US-based National Center for Missing and Exploited Children reported 32 million cases of suspected child sexual exploitation and abuse in 2022, further emphasizing the urgent need for action.

To protect child rights in the digital realm, there is a pressing need for increased cooperation and multidisciplinary efforts. The emerging risks presented by immersive digital spaces and AI-facilitated environments necessitate a collective approach to address these challenges. The UN Committee on the Rights of the Child has provided principles to guide efforts in safeguarding child rights in the ever-changing digital environment. By adhering to these principles, stakeholders can ensure the protection of children and the upholding of their rights online.

In addition to cooperation and multistakeholder efforts, raising awareness and promoting digital literacy are crucial in creating a safer digital ecosystem for children. Educating children about the potential risks they may encounter online empowers them to make informed decisions and stay safe. Responsible design principles that prioritize the safety, privacy and inclusion of child users should also be implemented. By adhering to these principles, developers can create platforms and technologies that provide a secure and positive digital experience for children.

The analysis highlights the urgent need for action to address the risks children face in the digital landscape. It underscores the importance of collaboration, guided by the principles set forth by the UN Committee on the Rights of the Child, to protect child rights in the digital world. Furthermore, it emphasizes the significance of raising awareness, promoting digital literacy, and implementing responsible design principles to ensure the safety and well-being of children online. Integrating these strategies will support the creation of a safer and more inclusive digital environment for children.

ZENGRUI LI

The Communication University of China (CUC) has made a significant move by incorporating Artificial Intelligence (AI) as a major, recognizing the transformative potential of this emerging technology. This integration showcases the university’s commitment to preparing students for the future and aligns with the United Nations’ Sustainable Development Goals (SDGs) of Quality Education and Industry, Innovation, and Infrastructure.

In addition to integrating AI into its programs, CUC has also established research centers focused on exploring and advancing emerging technologies. This demonstrates the university’s dedication to technological progress and interdisciplinary construction related to Internet technology.

CUC has also recognized the importance of protecting children online and the need for guidelines to safeguard their well-being in the face of emerging technologies. It is suggested that collaboration among government departments, scientific research institutions, social organizations, and relevant enterprises is crucial in establishing these guidelines. CUC’s scientific research teams have actively participated in the AI for Children project group, playing key roles in formulating guidelines for Internet applications for minors based on AI technology.

The comprehensive integration of AI as a major and the establishment of research centers at CUC reflect the university’s commitment to technological advancement. It highlights the importance of recognizing both the benefits and risks of emerging technologies and equipping students with the necessary skills and knowledge to navigate the digital landscape responsibly.

Overall, CUC’s initiative to integrate AI as a major and its involvement in protecting children online demonstrate a proactive approach towards technology, education, and social responsibility. The university’s collaboration with various stakeholders signifies the importance of interdisciplinary cooperation in addressing complex challenges in the digital age.

Sun Yi

The discussion revolves around concerns and initiatives related to online safety for children in Japan. It is noted that a staggering 98.5% of young people in Japan use the internet, with a high rate of usage starting as early as elementary school. In response, the Ministry of Internal Affairs and Communications has implemented an information security program aimed at educating children on safe internet practices. The program addresses the increasing need for online safety and provides children with the necessary knowledge and skills to navigate the online world securely.

Additionally, the NPO Information Security Forum plays a crucial role in co-hosting internet safety education initiatives with local authorities. These collaborative efforts highlight the significance placed on educating children about online safety and promoting responsible internet usage.

However, the discussions also highlight challenges associated with current online safety measures in Japan. Specifically, concerns arise regarding the need to keep filter application databases up-to-date to effectively protect children from harmful content. Moreover, the ability of children to disable parental controls poses a significant challenge in ensuring their online safety. Efforts must be made to address these issues and develop robust safety measures that effectively protect children from potential online threats.

On a positive note, there is recognition of the potential of artificial intelligence (AI) and big data in ensuring online safety for children. The National Institute of Advanced Industrial Science and Technology (AIST) provides real-time AI analysis for assessing the risk of child abuse. This highlights the use of advanced technology in identifying and preventing potential dangers that children may encounter online.

Furthermore, discussions highlight the use of collected student activity data to understand learning behaviors and identify potential distractions. This demonstrates how big data can be leveraged to create a safer online environment for children by identifying and mitigating potential risks and challenges related to online learning platforms.

To create supportive systems and enhance online safety efforts, collaboration with large platform providers is essential. However, challenges exist in collecting detailed data on student use, particularly on major e-learning platforms such as Google and Microsoft. Addressing these challenges is crucial to developing effective strategies and implementing measures to ensure the safety of children using these platforms.

In summary, the discussions on online safety for children in Japan emphasize the importance of addressing concerns and implementing initiatives to protect children in the digital space. Progress has been made through information security programs and collaborative efforts, but challenges remain in keeping filter applications up-to-date, configuring parental controls, and collecting detailed data from major e-learning platforms. The potential of AI and big data in enhancing online safety is recognized, and future collaborations with platform providers are necessary to create safer online environments for children.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Risks and opportunities of a new UN cybercrime treaty | IGF 2023 WS #225

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Sophie

The importance of children’s digital rights in the digital world is underscored by the United Nations. These rights encompass provision, protection, and participation, which are essential for children’s empowerment and safety in online spaces. General Commendation 25 by the UN specifically emphasises the significance of children’s digital rights. It is crucial to ensure that children have access to digital resources, that they are protected from harm and exploitation, and that they have the opportunity to actively engage and participate in the digital world.

Young children often seek support from their parents and teachers when faced with online risks. They rely on them as safety contact persons for any issues they encounter on the internet. As they grow older, children develop their own coping strategies by employing technical measures to mitigate online risks. This highlights the importance of parental and teacher support in assisting children in navigating the digital landscape and promoting their online safety.

Furthermore, the design of online spaces needs to be tailored to cater to the diverse needs of different age groups. Children, as active users, should have digital platforms that are user-friendly and age-appropriate. Children are critical of long processing times for reports on platforms, advocating for more efficient and responsive mechanisms. It is important to consider children’s perspectives and ensure that their voices are heard when designing and developing online spaces.

Human resources play a significant role in fostering safe interactions online. Children are more likely to use reporting tools that establish a human connection, thereby enhancing their sense of safety and anonymity. The THORN study conducted in the United States supports this viewpoint and suggests that human involvement positively affects children’s willingness to report online incidents.

The introduction of the Digital Services Act in the European Union is seen as a critical tool for protecting children’s data. This legislation is set to come into force next year and aims to enhance data protection measures for individuals, including children, in the digital sphere. The act aims to address issues related to privacy, security, and the responsible use of digital services to safeguard children’s personal information.

Children’s rights by design and their active participation in decision-making processes regarding the digital environment should be prioritised. The United Nations’ General Comment 25 highlights the importance of young people’s participation in decisions about the digital space. The German Children’s Fund has also conducted research that emphasises the need for quality criteria for children’s participation in digital regulations. By involving children in decision-making, their perspectives and experiences can inform policies and ensure that their rights are respected and protected.

Creating safe socio-digital spaces for children and adolescents is of paramount importance. These spaces should not be primarily influenced by product guidelines or market-driven interests but rather should prioritise the well-being and safety of children and young people. Civil society and educational organisations are seen as key stakeholders in shaping and creating these safe social spaces for children to engage in the digital world.

In conclusion, a holistic approach is necessary to advocate for children’s rights in the digital world. This entails promoting children’s digital rights, providing support and guidance from parents and teachers, adapting the design of online spaces to meet the needs of different age groups, harnessing the potential of human resources for safe interactions, and enacting legislation such as the Digital Services Act for protecting children’s data. Children and young people should be actively involved in their rights advocacy and be included in decision-making processes in the digital environment. The involvement of all stakeholders, including governments, organisations, and communities, is essential in advancing and safeguarding children’s rights in the digital world.

Steve Del Bianco

In the United States, the states of Arkansas and California faced legal action for implementing a controversial rule that required legal consent from a parent or guardian for individuals under the age of 18 to use social media sites. Steve Del Bianco, representing an organization, sued the states and deemed this measure to be aggressive.

The sentiment expressed towards this rule was negative, as it was seen as a potential infringement upon the rights of children and young individuals. The argument presented was that broad child protection laws have the potential to restrict a child’s access to information and their ability to freely express themselves. Judges who presided over the case acknowledged the importance of striking a balance between child rights and the need for protection from harm.

Steve Del Bianco, in the course of the proceedings, emphasized the significance of considering the best interest of the child. He argued that the state’s laws should undergo a test that balances the rights of the child with their protection from potential harm. According to Del Bianco, these laws should not excessively limit a child’s access to information or their ability to express their beliefs.

Moreover, it became evident that lawmakers lacked an understanding of the broader implications of their laws. This led to legal challenges and raised concerns about the effectiveness of these policies. Del Bianco’s organization obtained an injunction that effectively blocked the states from enforcing these laws. It was suggested that lawmakers should be educated and gain a better understanding of the potential consequences of their legislative decisions to avoid such legal challenges.

To summarize, the implementation of a rule requiring verifiable consent for underage individuals to use social media sites in certain US states sparked controversy and legal disputes. The negative sentiment towards this rule arose from concerns about potential limitations on the rights of children to access information and express themselves freely. The need to strike a balance between child rights and protection from harm was highlighted. Additionally, the lack of understanding by lawmakers about the broader implications of their laws was emphasized, underscoring the importance of better education and consideration in the legislative process.

B. Adharsan Baksha

AI adoption among children can pose significant risks, particularly in terms of data privacy. The presence of chatbots such as Synapse and MyAI has raised concerns as these tools have the capability to rapidly extract and process vast amounts of personal information. This raises the potential for exposing children to various cyber threats, targeted advertising, and inappropriate content.

The ability of chatbots to collect personal data is alarming as it puts children at risk of having their sensitive information compromised. Cyber threats, such as hacking or identity theft, can have devastating consequences for individuals, and children are especially vulnerable in this regard. Moreover, the information gathered by chatbots can be used by marketers to target children with ads, leading to potential exploitation and manipulation in the digital realm.

Inappropriate content is another concerning aspect of AI adoption among children. Without proper safeguards, chatbots may inadvertently expose children to age-inappropriate material, which can have a negative impact on their emotional and psychological well-being. Children need a secure and regulated online environment that protects them from exposure to harmful content.

It is crucial to recognise the need to ensure a secure cyberspace for children. This includes focusing on the development and implementation of effective measures related to artificial intelligence, children, and cybersecurity. Governments, organisations, and parents must work together to mitigate the risks associated with AI adoption among children.

In conclusion, AI adoption among children brings forth various risks, with data privacy issues at the forefront. Chatbots that possess the ability to collect personal data may expose children to cyber threats, targeted advertising, and inappropriate content. To safeguard children’s well-being and protect their privacy, it is essential to establish a secure online environment that addresses the potential risks posed by AI technology. The responsibility lies with all stakeholders involved in ensuring a safe and regulated cyberspace for children.

Katz

Child rights are considered fundamental and should be promoted. Katz’s child-focused agency actively advocates for the promotion of child rights. However, conflicts between child rights and freedom of expression can arise. Survey results revealed such conflicts, underscoring the need for balance between these two important aspects.

Misunderstandings or misinterpretations of child rights are common and must be addressed. Some people mistakenly believe that virtual child sexual abuse material (CSAM/SEM) can prevent real crime, indicating a lack of understanding or misinterpretation of child rights. Efforts should be made to educate and provide correct information regarding child rights to combat these misunderstandings.

Regulating AI in the context of child protection is a topic under discussion. Many respondents believe that AI should be regulated to ensure child protection, particularly in relation to CSAM/SEM. However, opinions on this matter are mixed, highlighting the need for further dialogue and research to determine the most appropriate approach.

Public awareness of the risks and opportunities of AI needs to be raised. Approximately 20% of respondents admitted to having limited knowledge about AI matters and associated risks. This signifies the need for increased education and awareness programs to ensure the public understands the potential benefits and dangers of AI technology.

Japan currently lacks regulations and policies concerning AI-generated imagery. Katz’s observation reveals a gap in the legal framework, emphasizing the necessity of establishing guidelines and regulations to effectively address this issue.

There is also a need for greater awareness and information dissemination about AI developments. Katz suggests that the media should take more responsibility in informing the public about advancements and implications of AI. Currently, people in Japan are not adequately informed about ongoing AI developments, highlighting the need for improved communication and awareness campaigns.

Katz recommends that the public should gather information from social networking services (SNS) about AI developments. This highlights the importance of utilizing various platforms to stay updated and informed about the latest developments in the field of AI.

A rights-based approach is crucial in designing regulation policies. It is essential to ensure that the rights of children and humans are protected in the digital world. Advocating for the enhancement of child and human rights in the digital sphere is a vital aspect of creating an inclusive and safe environment.

In conclusion, promoting child rights is essential, although conflicts with freedom of expression may arise. Addressing misunderstandings and misinterpretations of child rights is crucial. The regulation of AI in the context of child protection requires further examination and consideration. Public awareness about the risks and opportunities of AI needs to be improved. Japan lacks regulations for AI-generated imagery, and greater awareness about AI developments is necessary. Gathering information from SNS can help individuals stay informed about AI happenings. A rights-based approach is needed when designing regulation policies, and enhancing child and human rights in the digital world is vital.

Amy Crocker

During the event, the speakers highlighted the significant importance of children’s digital rights in creating a safe and secure online environment. They stressed that children’s rights should be protected online, just as they are in the offline world. General Comment Number 25 to the UN Convention on the Rights of the Child was mentioned as a recognition of the importance of children’s digital rights, with state parties being obligated to protect children from all forms of online exploitation and abuse.

In terms of internet governance, the speakers advocated for a proactive and preventive approach, rather than a reactive one. They argued that governments often find themselves playing catch-up with digital issues, reacting to problems after they have already occurred. A shift towards a preventive model of online safety was deemed necessary, which involves designing for safety before potential issues arise.

Effective implementation was seen as the key to turning digital policies into practice. The speakers emphasized the need to understand how to implement policies in specific local contexts to realize the full benefits. They argued that implementation is crucial in ensuring that children’s rights are protected and upheld online.

The need for public understanding of technology and its risks and opportunities was also highlighted. It was mentioned that improving public understanding is necessary for individuals to make informed decisions about their online activities. Empowering parents to understand technology and facilitate their children’s rights was seen as an important aspect of ensuring a safe online environment for children.

Trust was identified as a crucial element in the digital age, particularly with the growing reliance on technology. The speakers discussed the importance of trust against the backdrop of emerging risks related to data breaches, data privacy problems, and unethical practices. Building and maintaining trust were seen as essential for a secure online environment.

Safeguarding the younger generations online was viewed as a collective responsibility. The speakers stressed that parents and guardians cannot solely shoulder this responsibility and must have a certain level of knowledge of online safety. The importance of all stakeholders, including businesses, industries, and governments, working together to protect children’s rights online was emphasized.

Regulation was seen as an important tool for keeping children safe online. However, it was noted that regulation alone is not a solution for the challenges posed by emerging technologies. The speakers argued that both regulation and prevention through education and awareness are crucial in effectively addressing these challenges.

Differentiated regulation based on context was advocated for. The speakers highlighted that different online services offer different opportunities for children to learn and be creative. They also emphasized that children’s evolving capacities are influenced by various factors, such as their geographical and household contexts. Understanding the link between online and offline contexts was seen as essential in developing effective regulation.

Transparency, a culture of child rights, and collaborative efforts were identified as crucial for the protection of children’s rights online. All stakeholders, including businesses, industries, and governments, were urged to work together and have a shared understanding of child rights. The need for transparency in their commitment to protecting child rights was emphasized.

The challenges faced by developing countries in terms of technology and capacity building were acknowledged. The speakers discussed the specific challenges faced by countries like Bangladesh and Afghanistan in terms of accessing technology and building the necessary capacity. Opportunities for codes of conduct that can be adapted to different contexts were also explored.

Consulting children and young people was highlighted as an important approach to addressing online safety issues. The speakers emphasized the need to understand how children and young people feel about these issues and to learn from approaches to regulation that have been successful.

Amy Crocker, one of the speakers, encouraged people interested in children’s rights issues to join the Dynamic Coalition and continue similar conversations. Flyers and a QR code were mentioned as ways to sign up for the mailing list. The importance of creating more space within the IGF for discussing children’s rights issues was also emphasized.

In conclusion, the event highlighted the significant importance of protecting children’s digital rights and creating a safe and secure online environment for them. It emphasized the need for proactive and preventive internet governance, effective implementation of digital policies, public understanding of technology, empowering parents, trust, collective responsibility, regulation along with education and awareness, differentiated regulation based on context, transparency, and collaborative efforts. The challenges faced by developing countries were acknowledged, and the involvement of children and young people was seen as essential in addressing online safety issues.

Ahmad Karim

In a discussion concerning the design of advancing technology, Ahmad Karim, representing the UN Women Regional Office for Asia and the Pacific, stressed the importance of carefully considering the needs of girls, young adults, females, and marginalized and fragile groups. It was noted that, in such discussions, there is often a tendency to overlook gender-related issues, which indicates a gender-blind approach.

Another argument put forth during the discussion underscored the significance of making the design of the metaverse and technologies more considerate towards marginalized and fragile groups, especially girls and women. The rapid advancements in technology were acknowledged as having disproportionate effects on females and marginalized sectors of society. It was highlighted that national laws frequently do not adequately account for the specific needs and challenges faced by these groups.

The supporting evidence provided includes the fact that girls, young adults, and women are often underrepresented and encounter barriers in accessing and benefiting from technological advancements. Additionally, marginalized and fragile groups, such as those from low-income backgrounds or with disabilities, are particularly vulnerable to exclusion and discrimination in the design and implementation of technology.

The conclusion drawn from the discussion is that there is an urgent need for greater attention and inclusivity in the design of advancing technology. Consideration must be given to the unique needs and challenges faced by girls, young adults, females, and marginalized and fragile groups. It is imperative that national laws and policies reflect these considerations and ensure that these groups are not left behind in the technological progress.

This discussion highlights the significance of addressing gender inequality and reducing inequalities in the design and implementation of technology. It sheds light on the potential pitfalls and repercussions of disregarding the needs of marginalized and fragile groups, and calls for a more inclusive and equitable approach to technological advancements.

Tasneet Choudhury

During the discussion, the speakers highlighted the importance of ensuring the protection and promotion of child rights within AI strategies, policies, and ethical guidelines. They particularly emphasized the significance of these efforts in developing countries, such as Bangladesh. Both speakers stressed the need to include provisions that safeguard child rights in AI policies, especially in nations that are still in the process of development.

The speakers also connected their arguments to the Sustainable Development Goals (SDGs), specifically SDG 4: Quality Education and SDG 16: Peace, Justice, and Strong Institutions. They proposed that by embedding measures to protect child rights in AI strategies and policies, countries can contribute to the achievement of these SDGs. This link between AI development and the attainment of global goals highlights AI’s potential role in promoting inclusive and sustainable development.

Although no specific supporting facts were mentioned during the discussion, the speakers expressed a neutral sentiment towards the topic. This indicates their desire for a balanced and equitable approach to integrating child rights into AI strategies and policies. By addressing this issue neutrally, the speakers emphasized the need for a comprehensive and ethical framework that protects the rights and well-being of children in the context of AI development.

One notable observation from the analysis is the focus on child rights in the discussion of AI policies. This underscores the growing recognition of the potential risks and ethical implications that AI may pose for children, particularly in countries with limited resources and regulations. The emphasis on child rights serves as a reminder that as AI continues to advance, it is crucial to ensure that these technologies are developed with the best interests of children in mind.

In conclusion, the discussion underscored the importance of protecting and upholding child rights within AI strategies, policies, and ethical guidelines. The speakers highlighted the specific significance of this endeavor in developing countries like Bangladesh. The incorporation of child rights in AI policies aligns with the Sustainable Development Goals of Quality Education and Peace, Justice, and Strong Institutions. The neutral sentiment expressed by both speakers indicates the need for a balanced approach to addressing this issue. Overall, the discussion shed light on the need for a comprehensive and ethical framework that safeguards the rights of children amidst the development of AI technologies.

Jenna

Children today are immersed in the online world from a very young age, practically being born with access to the internet and technology. This exposure to the digital age has led to an increased need for trust in this new environment. Trust is seen as a cornerstone of the digital age, particularly as we rely on technology for almost every aspect of our lives. Without trust, our reliance on technology becomes more precarious.

Creating a reliable and ethical digital environment for younger generations requires imparting fundamental digital knowledge and nurturing trust. Building trust and instilling digital literacy are essential steps in safeguarding children online. Parents play a crucial role in this process, but it is also a shared responsibility that extends to all stakeholders. Informed parents are key as they are often the first line of defense for children facing challenges online. However, they cannot do it alone, and it is important for all stakeholders to be aware of their responsibility in protecting younger generations.

The challenges faced by teenagers today in the online world are more multifaceted and harmful than ever before. Cyberbullying has evolved from early stages of internet flaming and harassment via emails to more advanced forms like cyberstalking and doxing. The rise of generative AI has made creating hate image-based abuse relatively easier, contributing to a growing concern for online safety. It is important to address these issues effectively and efficiently to ensure the well-being of young people online.

The approach to online safety varies across different jurisdictions, with each adopting their own strategies and measures. For example, Australia has an industry code in place, while Singapore employs a government-driven approach. This diversity highlights the need for clear definitions and standards regarding online safety threats. A cohesive understanding of these threats is imperative to effectively combat them and ensure consistency across different regions.

Capacity building is essential for addressing the challenges of the digital age. Empowering young people and ensuring their voices are heard can lead to a better understanding of their needs and concerns. Additionally, understanding the technical aspects of internet governance is vital in developing effective solutions to address issues of online safety and security.

Inclusion and diversity are crucial in creating a safe online space. It is important to include the voices of different stakeholders and ensure that everyone has a seat at the table. Language can be a barrier, causing loss in translation, so efforts must be made to overcome this and make conversations more inclusive.

The perspective and insights of young people are valued in discussions on gender and technology. Gaining fresh and unique insights from the younger generation can contribute to the development of more inclusive and gender-responsive approaches. Jenna, a participant in the discussion, highlighted the need to engage young people in discussions related to explicit content and self-expression, as well as providing safe spaces for their voices to be heard.

Modernizing existing legal frameworks is seen as a more effective approach to addressing the impacts of AI and other technological advancements. Rather than a single legislative solution, updating legislation such as the Broadcasting Act, Consumer Protection Act, and Competition Act is seen as crucial in integrating present issues and adapting to the digital age.

Collaboration among stakeholders is essential for success. Capacity building requires research support, and the cooperation of multiple stakeholders is crucial in terms of legislation and regulations. By working together and leveraging each other’s strengths, stakeholders can more effectively address the challenges faced in the digital world.

Lastly, inclusive involvement of the technical community in the policy-making process is advocated. The technical community possesses valuable knowledge and insights that can contribute to the development of effective policies. However, it is acknowledged that their involvement may not always be the best fit for all policy-making decisions. Striking a balance between technical expertise and broader considerations is key to ensuring policies are robust and comprehensive.

In conclusion, children today are growing up in a digital age where they are exposed to the internet and technology from a young age. Building a reliable and ethical digital environment requires imparting digital knowledge and nurturing trust. Safeguarding younger generations online is a shared responsibility, requiring the involvement of all stakeholders. The challenges faced by teenagers today, such as cyberbullying and hate speech, are advanced and harmful. Different jurisdictions have varying approaches to online safety, emphasizing the need for clear definitions and standards. Capacity building and the inclusion of diverse voices are crucial in creating a safe online space. The perspective and insights of young people are valuable in discussions on gender and technology. Modernizing existing legal frameworks is advocated, and engaging young people in discussions on explicit content and self-expression is important. Collaboration among stakeholders and the inclusion of the technical community in policy-making processes are considered essential for success in addressing the impacts of the digital age.

Larry Magid

In the analysis, the speakers engage in a discussion regarding the delicate balance between protecting children and upholding their rights. Larry argues that protection and children’s rights are sometimes in conflict. He cites examples of proposed US laws that could suppress children’s rights in the guise of protection. Larry also highlights the UN Convention, which guarantees children’s rights to freedom of expression, participation, and more.

On the other side of the debate, another speaker opposes legislation that infringes upon children’s rights. They point out instances where such legislation may limit children’s rights, such as requiring parental permission for individuals under 18 to access the internet. Their sentiment towards these laws is negative.

Lastly, a speaker emphasises the need for a balanced approach to regulation, one that can protect and ensure children’s rights while acknowledging the inherent risks involved in being active in the world. They argue for a fair equilibrium between rights and protection. Their sentiment remains neutral.

Throughout the analysis, the speakers recognize the challenge in finding the proper balance between protecting children and preserving their rights. The discussion highlights the complexities and potential conflicts that arise in this area, and stresses the importance of striking a balance that safeguards children’s well-being while still allowing them to exercise their rights and freedoms.

Katarzyna Staciewa

In a recent discussion focusing on the relationship between the metaverse and various sectors such as criminology and child safety, Katarzyna Staciewa, a representative from the National Research Institute in Poland, shared her insights and emphasized the need for further discussions and research in criminology and other problematic sectors. Staciewa drew upon her experiences in law enforcement and criminology to support her argument.

Staciewa discussed her research on the metaverse, highlighting its significance in guiding the development of developing countries. The metaverse, an immersive virtual reality space, has the potential to shape the future of these countries by offering new opportunities and addressing socio-economic challenges. Staciewa’s positive sentiment towards the metaverse underscored its potential as a tool for fostering quality education and promoting peace, justice, and strong institutions, as outlined in the relevant Sustainable Development Goals (SDGs).

However, concerns were raised during the discussion regarding the potential misuse of the metaverse and AI technology, particularly in relation to child safety. Staciewa analyzed the darknet and shed light on potentially sexually interested groups involving children, revealing alarming trends. The risks associated with the metaverse lie in the possibility of AI-generated child sexual abuse material (CSAM) and the potential for existing CSAM to be transformed into virtual reality or metaverse frames. The negative sentiment expressed by Staciewa and others reflected the urgency to address these risks and prevent harm to vulnerable children.

The speakers placed strong emphasis on the importance of research in taking appropriate actions to ensure child safety. Staciewa’s research findings highlighted the constant revictimization faced by child victims, further underscoring the need for comprehensive measures to protect them. By conducting further research in the field of child safety and child rights, stakeholders can gain a deeper understanding of the challenges posed by the metaverse and AI technology and develop effective strategies to mitigate these risks.

In conclusion, the discussion on the metaverse and its impact on various sectors, including criminology and child safety, highlighted the need for more research and discussions to harness the potential of the metaverse while safeguarding vulnerable populations. While acknowledging the metaverse’s ability to guide the development of developing countries and the positive impact it can have on education and institutions, concerns were expressed about the possibility of misuse, particularly with regards to child safety. The importance of research in understanding and addressing these risks was strongly emphasized, particularly in the context of the continuous victimization of child victims.

Patrick

During the discussion on child safety and online policies, the speakers emphasised the importance of taking a balanced approach. While regulation was acknowledged as a crucial tool in ensuring child safety, the speakers also highlighted the significance of prevention, education, and awareness.

It was noted that regulation often receives more attention due to its visibility as a commitment to child safety. However, the lack of proportional investment in prevention aspects, such as awareness-raising and education, was seen as a gap.

Addressing the specific needs of children in relation to their evolving capacities and contexts was deemed crucial. A differentiated approach to regulation was recommended, taking into consideration the diverse services and opportunities available for children to learn digital skills. The household environment, geographical context, and access to non-digital services were identified as factors that influence children’s evolving capacities.

A unified understanding and commitment to child rights were highlighted as prerequisites for effective regulation. The speakers pointed out that there is often a significant variation in how child rights are interpreted or emphasised in different regional, cultural, or religious contexts. It was stressed that a transparent commitment and culture of child rights are necessary from industries, businesses, and governments for any successful regulation to be established.

The tendency of developing countries to adopt policies and legislation from key countries without critically analysing the unique challenges they face was criticised. The speakers observed this trend in policy-making from Southern Africa to North Africa and the Asia Pacific region. The need for developing countries to contextualise policies and legislation according to their own specific circumstances was emphasised.

An issue of concern raised during the discussion was the reluctance of countries to update their legislation dealing with sexual violence. The process for legislation update was noted to be lengthy, often taking up to five to ten years. This delay was seen as a significant barrier to effectively addressing the issue and protecting children from sexual violence.

The role of industries and companies in ensuring child safety was also highlighted. It was advocated that industries should act as frontrunners in adopting definitions and staying updated on technologically enhanced crimes, such as AI-generated child sexual abuse material (CSAM). The speakers argued that industries should not wait for national policies to change but should instead take initiative in adhering to certain definitions and guidelines.

The importance of engaging with children and listening to their experiences and voices in different contexts was emphasised. The speakers stressed that children should have a critical say in the internet space, and adults should be open to challenging their own thinking and assumptions. Meaningful engagement with children was seen as essential to understanding their needs and desires in using the internet safely.

In addition, the speakers highlighted the need for cross-sector participation in discussing internet safety. They recommended involving experts from various fields, such as criminologists, educators, social workers, public health specialists, violence prevention experts, and child rights legal experts. A holistic and interdisciplinary approach was deemed necessary to address the complex issue of internet safety effectively.

Overall, the discussion on child safety and online policies emphasised the need for a balanced approach, taking into account regulation, prevention, education, and awareness. The importance of considering the evolving capacities and contexts of children, a unified understanding and commitment to child rights, and the role of industries and companies in taking initiative were also highlighted. Additionally, the speakers stressed the significance of engaging with children and adopting a cross-sector approach to ensure internet safety.

Andrew Campling

The discussions revolve around the significant impact that algorithms have on child safety in the digital realm. One particularly tragic incident occurred in the UK, where a child took their own life after being exposed to suicide-relevant content recommended by an algorithm. This heartbreaking event highlights the dangerous potential of algorithms to make malicious content more accessible, leading to harmful consequences for children.

One key argument suggests that restrictions should be placed on surveillance capitalism as it applies to children. The aim is to prevent the exposure of children to malicious content by prohibiting the gathering of data from known child users on platforms. These restrictions aim to protect children from potential harms caused by algorithmic recommendations of harmful content.

Another concerning issue raised during these discussions is the use of AI models to generate Child Sexual Abuse Material (CSAM). It is alarming that in some countries, this AI-generated CSAM is not yet considered illegal. The argument is that both the AI models used in generating CSAM and the circulation of prompts to create such content should be made illegal. There is a clear need for legal measures to address this concerning loophole and protect children from the creation and circulation of CSAM.

Furthermore, it is argued that platforms have a responsibility towards their users, particularly in light of the rapid pace of technological change. It is suggested that platforms should impose a duty of care on themselves to ensure the safety and well-being of their users. This duty of care would help manage the risks associated with algorithmic recommendations and the potential harms they could cause to vulnerable individuals, especially children. Importantly, the argument highlights the difficulty regulators face in keeping up with the ever-evolving technology, making it crucial for platforms to step up and take responsibility.

In conclusion, the discussions surrounding the impact of algorithms on child safety in the digital realm reveal significant concerns and arguments. The tragic incident of a child’s suicide underscores the urgency of addressing the issue. Suggestions include imposing restrictions on surveillance capitalism as it applies to children, making AI-generated CSAM illegal, and holding platforms accountable for their users’ safety. These measures aim to protect children and ensure a safer digital environment for their well-being.

Amyana

The analysis addresses several concerns regarding child protection and the legal framework surrounding it. Firstly, there is concern about the unequal application of international standards for child protection, particularly between children from the Global South and the Global North. This suggests that children in developing countries may not receive the same level of protection as those in more developed regions. Factors such as resource distribution, economic disparities, and varying levels of political commitment contribute to this discrepancy in child protection standards.

Another notable concern highlighted in the analysis is the inadequacy of current legislation in dealing with images of child abuse created by artificial intelligence (AI). As technology advances, AI is increasingly being used to generate explicit and harmful content involving children. However, existing laws appear ineffective in addressing the complexities associated with such content, raising questions about the efficacy of the legal framework in the face of rapidly evolving technology.

On a positive note, there is support for taking proactive measures and demanding better protection measures from online platforms. Efforts are being made to provide guidelines and recommendations to agencies working with children and adolescents, aimed at enhancing child protection in the digital space and promoting the well-being of young individuals online. This demonstrates an awareness of the need to keep pace with technological advancements and adapt legal frameworks accordingly.

Overall, the analysis underscores the importance of addressing the unequal application of international standards for child protection and the challenges posed by AI-generated images of child abuse. It emphasizes the need for updated legislation that aligns with emerging technologies, while also advocating for proactive measures to enhance protection on online platforms. These insights provide valuable considerations for policymakers, child protection agencies, and stakeholders working towards establishing robust and inclusive frameworks for child protection globally.

Jim

The discussion emphasized the importance of regulating and supporting internet technology in developing countries, as evidenced by the interest and concern of participants from regions such as Bangladesh and Kabul University. This real-world engagement highlights the relevance and urgency of the issue in developing regions.

Jim, during the discussion, summarised and acknowledged the questions raised by participants from developing nations, demonstrating his support for addressing the challenges and needs specific to these countries. He stressed the need to consider these perspectives when dealing with the issues surrounding internet technology in developing countries. This recognition of diverse needs and experiences reflects a commitment to inclusivity and ensuring that solutions are tailored to the circumstances of each country.

The overall sentiment observed in the discussion was neutral to positive. This indicates a recognition of the importance of regulating and supporting internet technology in developing countries, and a willingness to address the challenges and concerns associated with it. The positive sentiment suggests support for efforts to enhance access to, and the effectiveness of, internet technology in these regions, contributing to the United Nations Sustainable Development Goals of Industry, Innovation and Infrastructure (SDG 9) and Reduced Inequalities (SDG 10).

In conclusion, the discussion highlights the crucial role of regulation and support for internet technology in developing countries. The participation and engagement of individuals from these regions further validate the significance and necessity of addressing their specific needs and challenges. By considering the perspectives of those in developing nations and taking appropriate actions to bridge the digital divide, we can work towards achieving a more inclusive and equitable global digital landscape.

Liz

In a recent discussion on online safety, Microsoft emphasised its responsibility in protecting users, particularly children, from harmful content. They acknowledged that tailored safety measures, based on the type of service, are necessary for an effective approach. However, they also highlighted the importance of striking a balance between safety and considerations for privacy and freedom of expression.

One speaker raised an interesting point about the potential risks of a “one size fits all” approach to addressing online safety. They argued that different services, such as gaming or professional social networks, require context-specific interventions. Implementing broad-scoped regulation could inadvertently capture services that have unique safety requirements.

Both legislation and voluntary actions were deemed necessary to address children’s online safety. Microsoft highlighted their focus on building safety and privacy by design. By incorporating safety measures from the very beginning during product development, they aim to create a safer online environment for users.

However, concerns were also raised about the current state of legislation related to online safety and privacy. It was noted that legislative efforts often lack a holistic approach and can sometimes contradict each other. Some safety and privacy legislations contain concepts that may not optimise online safety measures.

Microsoft also recognised the risks posed by AI-generated child sexual abuse material (CSAM) and emphasised the need for responsible AI practices. They are actively considering these risks in their approach to ensure the responsible use of AI technologies.

The discussion strongly advocated for the importance of regulation in addressing online harms. Microsoft believes that effective regulation and a whole society approach are crucial in tackling the various challenges posed by online safety. They emphasised the need for ongoing collaboration with experts and stakeholders to continuously improve online child safety measures and access controls.

Another key aspect discussed was the need for a better understanding of the gendered impacts of technology. It was highlighted that current research lacks a comprehensive understanding of youth experiences, particularly for females and different cultures. Additional research, empowerment, and capacity building were suggested as ways to better understand the gendered implications of technology.

In conclusion, the discussion stressed the importance of collaboration, open-mindedness, and continuous learning in addressing online safety. Microsoft’s commitment to protecting users, especially children, from harmful content was evident in their approach to building safety and privacy by design. The speakers highlighted the complexities of the topic and emphasised the need for context-specific interventions and effective regulation to ensure a safer online environment for all users.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Policy Network on Internet Fragmentation | IGF 2023

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Bruna Marlins dos Santos

During the session, a comprehensive presentation will be given on the Policy Network’s discussion paper. The paper examines various aspects outlined in the Policy Network framework, and debates will be held to delve further into these topics. The aim of the session is to foster a thorough understanding of the discussion paper and encourage insightful discussions among participants.

The presentation and subsequent debates are of significant importance to the Policy Network as they provide an opportunity to seek feedback, gather perspectives, and refine the framework. The Policy Network values the contribution of its volunteers and acknowledges their role in shaping the document. Bruna, in particular, expresses profound gratitude to all the volunteers who helped shape the document with their time and effort. It is heartening to note that some of these volunteers are present during the session, indicating their continued commitment to the Policy Network’s values and goals.

The discussions and presentations align with two Sustainable Development Goals (SDGs): SDG 16 and SDG 17. SDG 16 focuses on promoting peaceful and inclusive societies, providing access to justice for all, and building effective, accountable, and inclusive institutions. The Policy Network’s efforts to facilitate debates and discussions on the various aspects outlined in the framework contribute to these goals. Furthermore, SDG 17 emphasizes the importance of partnerships and collaboration to achieve the SDGs. The Policy Network recognizes the significance of collaboration and appreciates the volunteers who have worked alongside them, highlighting the importance of partnership for the goals.

In conclusion, the upcoming session will involve a detailed presentation of the Policy Network’s discussion paper, as well as debates on the various aspects outlined in the framework. The volunteers of the Policy Network are greatly appreciated and thanked for their invaluable contribution in shaping the document. The discussions and presentations align with SDG 16 and SDG 17, incorporating elements of peace, justice, strong institutions, and partnerships for the goals. By engaging in these activities, the Policy Network aims to further progress towards achieving the SDGs and creating positive change.

Olaf Kolkman

The discussion revolves around the topic of internet fragmentation and its implications on connectivity and global inclusivity. One aspect highlighted is the lack of a clear and operationalized definition for technical fragmentation, resulting in different frameworks for understanding the concept. While fragmentation is often seen as a negative phenomenon, certain types of fragmentation, such as decentralisation, lack of connectivity by choice, or temporary network glitches, are considered to be non-problematic.

However, the evolving nature of the internet and its changing routing behaviour may lead to a different kind of fragmentation, potentially increasing the digital divide. This digital divide could be more prominent in lesser connected parts of the world and could result in a disparity in user experience. Therefore, it is important to address and mitigate these effects to ensure global connectivity.

A key argument presented is the need to protect the critical properties of the internet for global connectivity. Fragmentation in the technical infrastructure is likely to be reflected in the user space, affecting the overall user experience. It is crucial to continually evolve the internet and avoid ossifying it in its current state.

Furthermore, a multi-stakeholder approach is deemed necessary to ensure global connectivity and prevent fragmentation. Stakeholders include the private sector, technical communities, civil society, and governments. By involving various stakeholders, it is believed that a collaborative effort can be made to address global connectivity issues effectively.

One notable observation is the call for a more nuanced understanding of the issues surrounding internet fragmentation. It is suggested that a broader perspective is required to fully comprehend the implications and consequences of different forms of fragmentation.

Another important point raised is the protection of an open internet architecture. This open architecture should be safeguarded to promote common protocols and interoperability. It is argued that an open internet architecture allows for the evolution of the internet and ensures its continued effectiveness and accessibility.

Additionally, the affordability and accessibility of the internet are highlighted as crucial factors in preventing the creation of a digital divide. Issues such as the concept of the “death of transit” and pricing disparities are mentioned, which can hinder individuals’ ability to access the internet. To prevent exclusion, it is important to address these affordability and accessibility challenges, ensuring that everyone who wants to connect can do so.

In conclusion, the analysis emphasises the need for a clear definition of internet fragmentation and a comprehensive understanding of its various forms. Protecting the critical properties of the internet, adopting a multi-stakeholder approach, preserving an open internet architecture, and addressing affordability and accessibility issues are crucial steps towards ensuring global connectivity and preventing the creation of a digital divide. The ultimate goal is to provide equitable access to the internet, ensuring that everyone who desires to connect can do so.

Rosalind Kenny Birch

Fragmentation at the governance layer of internet governance can have negative consequences, such as duplicative discussions and excluding certain groups from the decision-making process. This fragmentation occurs when global internet governance and standards bodies fail to coordinate inclusively. The lack of coordination can lead to redundant conversations and the marginalisation of specific stakeholders.

Furthermore, this fragmentation at the governance layer does not just impact that particular level; it can also have knock-on effects on other layers of the internet user experience and the technical layer. The issues arising from governance fragmentation can trickle down to affect the overall user experience and technical functionalities of the internet. This highlights the interconnectedness of the different layers and the need for holistic approaches to address fragmentation.

To combat fragmentation, inclusivity is considered a central approach. When multi-stakeholder community participation is limited or not fully empowered, fragmentation tends to occur. Therefore, promoting inclusivity becomes crucial in combating governance fragmentation.

Instead of introducing new bodies into the internet governance landscape, it is recommended that existing internet governance bodies focus on improving coordination. Introducing additional bodies may further complicate the already complex governance landscape. Therefore, enhancing coordination among existing bodies is seen as a preferable solution to address fragmentation.

Moreover, it is important to ensure regional nuances and cultural contexts are considered in global internet governance bodies. Internet governance bodies should strive to accommodate the perspectives and voices of all stakeholders, regardless of their cultural or regional background. This can be achieved through better coordination and utilising platforms like National and Regional Initiatives (NRIs) or the Internet Governance Forum (IGF). These platforms provide opportunities to discuss local nuances, regional contexts, and ensure diverse perspectives are heard. For instance, the Africa IGF was identified as a fruitful opportunity to learn about regional perspectives and the importance of cultural and regional inclusions.

In conclusion, fragmentation at the governance layer of internet governance has negative implications, including duplicative discussions and exclusion of certain groups. Inclusivity is crucial to address this fragmentation, and existing internet governance bodies should focus on improving coordination rather than introducing new bodies. Additionally, considering regional nuances and cultural contexts in global internet governance is vital for inclusive decision-making processes. Platforms like NRIs and IGF can play a significant role in fostering regional and cultural inclusivity.

Suresh Krishnan

The internet is a decentralised set of networks that lacks a single point of control. It is a collaborative effort involving multiple individuals who have built this expansive network. This characteristic of decentralisation is a fundamental aspect of the internet, allowing for its widespread connectivity and accessibility.

Technology plays a crucial role in the internet’s functioning by enabling interoperability between these networks. It provides the means to bind different networks together, allowing seamless communication and data exchange. This interoperability is essential for the smooth operation of the internet and facilitates the flow of information across various platforms and devices.

Openness and incremental deployability are critical properties of the internet. The internet constantly evolves with the deployment of new technologies. This adaptability and openness enable the integration of innovative technologies onto the internet, keeping it up to date and capable of supporting new applications and services.

Content filtering is an important consideration in the context of the internet. It is argued that content filtering should occur at higher layers, taking into account the differences in laws across countries, states, and localities worldwide. This approach acknowledges the diverse legal frameworks and ensures that filtering is done in a way that respects local regulations whilst maintaining the internet as an open and inclusive platform.

The multi-stakeholder approach has played a significant role in the development and governance of the internet. This collaborative approach involves stakeholders from various sectors working together to shape policies and decisions regarding the internet’s management. The internet has thrived and evolved due to this inclusive approach, allowing for diverse perspectives and expertise to contribute to its growth and stability.

Efforts in internet measurement are critical for understanding and improving the internet’s performance. There is a need for more measurement points across the globe and a platform for individuals to conduct their own experiments and assessments. By increasing the focus on internet measurement, we can gain valuable insights into the network’s strengths, weaknesses, and overall quality, leading to targeted improvements and advancements.

However, a noteworthy critique is the lack of references in the document. It is important to provide credible sources and citations to support the arguments and claims made. For example, referencing RFC 1958, which discusses the architecture of the internet, would add credibility and depth to the document’s assertions.

In conclusion, the internet’s decentralised nature, enabled by technology’s interoperability, openness, and incremental deployability, has shaped its development. Content filtering should be approached in a way that considers the differences in laws worldwide whilst maintaining the internet’s accessibility. The multi-stakeholder approach has been instrumental in managing and evolving the internet. Finally, efforts in internet measurement are necessary for ongoing improvement, but it is crucial to provide proper references to support the document’s claims and arguments.

Sheetal Kumar

The Policy Network on Internet Fragmentation has spent the year exploring the complexities of Internet fragmentation. They have developed a comprehensive framework that allows them to understand and address fragmentation from different perspectives. The network aims to unpack the elements of the framework, identify priorities, and formulate recommendations for action. They advocate for a multi-stakeholder approach, recognizing the involvement of diverse stakeholders in fragmentation. Seeking feedback from the community, the network wants to align their priorities with the international community and ensure comprehensive recommendations. Their ultimate goal is to provide clarity to the complex and contentious issue of Internet fragmentation, foster ongoing dialogue and engagement, and contribute towards a more connected digital landscape.

Marielza Oliveira

User experience fragmentation refers to the division or segregation of users into different information environments or platforms, resulting in varying levels of access to content and features. This issue has both positive and negative aspects.

On the positive side, user experience fragmentation can include features and content that are specifically designed to benefit the user. For example, certain platforms may tailor recommendations based on the user’s preferences, resulting in a more personalised experience. Additionally, some users may appreciate being able to navigate through smaller, more specialised content ecosystems that align with their interests or values.

However, on the negative side, user experience fragmentation can restrict users’ access to certain content and limit their exposure to diverse perspectives. This can create information bubbles or echo chambers, where users are only exposed to information that supports their existing beliefs or biases. As a result, users may be deprived of opportunities to engage with differing opinions and challenge their own viewpoints. Moreover, this kind of fragmentation can lead to the reinforcement of social, political, or cultural divides, as it inhibits the free flow of information and impedes dialogue and understanding among different groups.

Negative user experience fragmentation affects all users and is a cause for concern. It has significant implications for the rights to access information and freedom of expression. When users are unable to access certain content or are forced into specific information environments, their right to freely seek and impart information is restricted. Additionally, non-targeted users, who may have diverse perspectives, are hindered in their ability to associate with those who are isolated in different information spaces. This ultimately curtails the richness of public discourse and limits the potential for fostering inclusive and diverse dialogue.

Furthermore, user experience fragmentation can be classified as either good or bad. Good fragmentation describes situations where fragmentation is achieved through a multi-stakeholder process and upholds principles of openness and accessibility. On the other hand, bad fragmentation tends to be the result of unilateral decision-making processes, disregarding the interests of users and reducing openness and accessibility.

It is argued that principles regarding user experience should be rooted in human rights standards. Human rights standards are globally accepted and provide a solid jurisprudence foundation for assessing the legitimacy of interfering with the freedom of expression. Adhering to these principles ensures that user experience is guided by ethical considerations and serves the broader goal of promoting peace, justice, and strong institutions.

To mitigate the negative effects of fragmentation, it is suggested that enforcing platform interoperability, data portability, and enhancing users’ media and information literacy can be effective strategies. Platform interoperability allows users to seamlessly navigate between different information environments, fostering exposure to diverse sources and perspectives. Data portability enables users to retain control over their personal information and move it between platforms, preserving their agency and reducing reliance on a single platform. Strengthening users’ media and information literacy empowers individuals to critically evaluate information and navigate the vast amount of content available on the internet in a safe and informed manner. These measures can counteract the negative consequences of fragmentation, such as echo chambers and the spread of misinformation.

In conclusion, user experience fragmentation has both positive and negative dimensions, with its impact extending beyond individual users to society as a whole. While it can provide tailored experiences and niche content, it also limits access to diverse perspectives and contributes to societal divisions. Adhering to human rights standards and implementing measures to mitigate the negative effects are essential in ensuring that user experiences are inclusive, ethical, and conducive to fostering an informed and democratic society.

Jordan Carter

In the analysis of internet governance, several key points were highlighted. Firstly, there was a strong argument for the need for broad-based participation in standards bodies and global internet governance organisations. The analysis acknowledged the Western bias in participation that currently exists and stressed the importance of greater inclusivity to ensure a more equitable representation.

Another critical issue discussed was the definition of governance fragmentation in internet governance. The analysis criticised the current definition, stating that it is too narrow. This suggests that a more comprehensive understanding of fragmentation is required to effectively address the challenges.

Further examination revealed that the narrow mandates of many technical internet governance organisations contribute to governance fragmentation. While these mandates serve important purposes, they can restrict organisations from adopting a systemic view of the internet. This limitation hinders their ability to address the complex governance challenges faced in the digital age.

The analysis also emphasised the need for better coordination between internet governance bodies. It highlighted the potential for meaningful collaboration among the individuals involved in global internet governance bodies, stressing that improved coordination would enhance effectiveness and outcomes.

Lastly, the analysis touched upon the relationship between the multi-stakeholder-driven internet governance system and the multilateral or state-based regulatory and legal system. It argued that these two systems should work together and influence each other positively. By shaping policies and practices collaboratively, a more effective and balanced internet governance framework could be achieved.

Overall, the analysis underscored the importance of broad-based participation, the need for a broader definition of governance fragmentation, and the significance of coordination and collaboration between internet governance bodies. It also highlighted the potential benefits of aligning the multi-stakeholder-driven system with the multilateral or state-based system. These insights bring attention to key areas where improvements are necessary to ensure a more inclusive, effective, and cohesive approach to internet governance.

Roswitharu

The issue of user experience level fragmentation is a complex one, with perspectives depending on one’s geographic and socio-economic context. People in Silicon Valley and the US West Coast express major complaints about actions taken by governments in authoritarian countries or the privacy laws of the European Union. Conversely, Europeans primarily complain about the actions of Silicon Valley platforms.

Maintaining a balance between the global nature of the internet and the preservation of local sovereignty is vital. The original vision of the internet was to unite the planet by enabling unrestricted communication. However, disparities in values, economic systems, and languages have caused tension and division.

Efforts to address these issues should focus on pragmatism and determining the existence of a problem rather than getting caught up in semantics. Rather than engaging in unproductive debates over definitions, it is more constructive to seek agreement on the existence of a problem. This pragmatic approach allows for practical solutions and avoids getting stuck in semantic disputes that do not lead to meaningful progress.

In conclusion, addressing user experience level fragmentation requires considering different perspectives based on geographic and socio-economic contexts. Acknowledging concerns raised by individuals in Silicon Valley and the US West Coast about governments in authoritarian countries or EU privacy laws, as well as addressing European concerns about the actions of Silicon Valley platforms, is essential for improving overall user experience. Striking a balance between the global nature of the internet and the preservation of local sovereignty is crucial. Taking a pragmatic approach that focuses on assessing the existence of a problem rather than getting caught up in semantics will drive progress towards resolving these challenges.

Wim Degezelle

Internet fragmentation is a complex concept without a clear definition, as there are different views on the subject. However, three categories or “baskets” of fragmentation have been identified: fragmentation of Internet user experience, fragmentation of Internet governance and coordination, and fragmentation of the technical layer. The complexity of the topic led to the abandonment of creating a precise definition for Internet fragmentation.

To facilitate discussions and understanding of Internet fragmentation, a framework was developed. This framework aims to provide a structure for discussing the various aspects of Internet fragmentation rather than providing a strict definition. It outlines the three aforementioned categories or “baskets” of fragmentation: fragmentation of Internet user experience, fragmentation of Internet governance and coordination, and fragmentation of the technical layer.

Multi-stakeholder discussions are crucial when addressing Internet fragmentation. These discussions involve various stakeholders, who may differ depending on the specific category of fragmentation being discussed. This highlights the importance of different groups coming together to discuss Internet fragmentation, with each category attracting different stakeholders.

To effectively address Internet fragmentation, it is necessary to have discussions that span across all categories. This is because guidelines for avoiding or addressing fragmentation may not be fully complementary between different categories. By having discussions across the “baskets” or categories, a cross-category approach can be developed to better tackle Internet fragmentation.

In conclusion, Internet fragmentation is a complex issue without a definitive definition. However, through the identification of three categories of fragmentation and the development of a framework for discussions, progress can be made in understanding and addressing this issue. Multi-stakeholder discussions that encompass all categories are essential to effectively navigate the challenges posed by Internet fragmentation.

Audience

The analysis delves into the topic of internet fragmentation and its various implications. It highlights the negative effects of technical fragmentation on the internet’s ability to evolve, innovate, and adapt. The argument is made that when the internet is split into different networks, its potential for growth and development is hindered. The analysis underscores the importance of maintaining the unity and interconnectivity of the internet to enable progress and positive outcomes.

The need for a uniform and unharmful user experience on the internet is also explored. It is noted that elements representing the user experience should be safeguarded to ensure a consistent and positive online environment. Additionally, the significance of interoperability is underscored. It is stated that interoperability is crucial for the smooth functioning of the internet, allowing different systems and devices to communicate effectively with each other.

The harmful effects of fragmentation are examined, particularly in relation to blocking user access to certain sites or content. This type of harmful fragmentation is seen as a significant problem, as it restricts users’ freedom and limits their ability to fully utilize the internet.

The analysis further delves into the impact of fragmentation on democracy and the digital space. It is argued that the integrity of the digital space is crucial for the defense of democracy. The risks associated with fragmenting the digital space are highlighted, bringing attention to the potential negative consequences.

Additional topics discussed include the ownership of IP addresses and the importance of decoupling IP addresses from networks. The analysis suggests that everyone should own their own IP address, allowing for more control and autonomy in the online space.

The involvement of regional or cultural leaders in internet policy formation is explored as a way to mitigate the impact of internet shutdowns and address the needs of specific communities. Engaging these leaders can lead to more inclusive and effective initiatives.

The potential widening of the digital divide due to the availability of satellite internet is also discussed. The rise of satellite and private corporate satellite internet is seen as a concern, as it could lead to the exclusion of certain populations and affect the quality of the online experience for many.

The challenges of implementing recommendations for internet fragmentation and the importance of internet governance are also addressed. The analysis acknowledges the difficulty in implementing recommendations due to the evolving and decentralized nature of the internet. It is concluded that there is a need to create governance to prevent internet fragmentation and ensure a cohesive and inclusive online environment.

Overall, the analysis offers a comprehensive examination of the topic of internet fragmentation, highlighting its negative effects and the importance of maintaining a unified and interconnected internet. It emphasizes the need for a uniform and unharmful user experience, interoperability, and inclusive internet policies.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Bruna

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Jordan

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Marielza

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Olaf

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Rosalind

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Sheetal

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Suresh

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Wim

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Protect people and elections, not Big Tech! | IGF 2023 Town Hall #117

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Daniel Arnaudo

In 2024, several countries, including Bangladesh, Indonesia, India, Pakistan, and Taiwan, are set to hold elections, making it a significant year for democracy. However, smaller countries often do not receive the same level of attention and support when it comes to content moderation, policies, research tools, and data access. This raises concerns about unfair treatment and limited resources for these nations.

Daniel highlights the need for improved data access for third-party researchers and civil society, particularly in smaller countries. Currently, there is a disinvestment in civic integrity, trust, and safety, which further exacerbates the challenges faced by these nations. Platforms are increasingly reducing third-party access to APIs and other forms of data, making it harder for researchers and civil society to gather valuable insights. Large countries often control access systems, resulting in high barriers for smaller nations to access data.

Another pressing issue raised is the insufficient addressing of threats faced by women involved in politics on social media platforms. Research shows that women in politics experience higher levels of online violence and threats. Daniel suggests that platforms establish mechanisms to support women and better comprehend and tackle these threats. Gender equality should be prioritised to ensure that women can participate in politics without fear of harassment or intimidation.

To effectively navigate critical democratic moments, such as elections or protests, social media platforms should collaborate with organisations that possess expertise in these areas. Daniel mentions the retreat from programs like the Trusted Partners at Meta and highlights the potential impacts on elections, democratic institutions, and the bottom lines of these companies. By working alongside knowledgeable organisations, platforms can better understand and respond to the needs and challenges of democratic events.

Algorithmic transparency is a desired outcome, but it proves to be a complex issue. While it has the potential to improve accountability and fairness, there are risks of manipulation or gaming the system. Striking the right balance between transparency and safeguarding against misuse is a delicate task that requires careful consideration.

Smaller political candidates seeking access to reliable and accurate political information need better protections. In order to level the playing field, it is crucial to provide resources and support to candidates who may not have the same resources as their larger counterparts.

The data access revolution is transforming how companies provide access to their systems. This shift enables greater innovation and collaboration, particularly in industries like infrastructure and industry. Companies should embrace this transformation and strive to make their systems more accessible, promoting inclusivity and reducing inequalities.

Deploying company employees in authoritarian contexts poses challenges. Under certain regulations, these employees might become bargaining chips, compromising the companies’ integrity and principles. It is essential to consider the potential risks and implications before making such decisions.

Furthermore, companies should invest in staffing and enhancing their understanding of local languages and contexts. This investment ensures a better response to users’ needs and fosters better cultural understanding, leading to more effective and inclusive collaborations.

In conclusion, 2024 holds significant democratic milestones, but there are concerns about the attention given to smaller countries. Improving data access for researchers and civil society, addressing threats faced by women in politics, working with organisations during critical democratic moments, and promoting algorithmic transparency are crucial steps forward. Protecting smaller political candidates, embracing the data access revolution, considering the risks of deploying employees in authoritarian contexts, and investing in local understanding are additional factors that warrant attention for a more inclusive and balanced democratic landscape.

Audience

The analysis raises a number of concerns regarding digital election systems, global media platforms, data access for research, and the integrity of Russia’s electronic voting systems. It argues that digital election systems are susceptible to cyber threats, citing a disruption in Russian elections caused by a denial of service attack from Ukraine. This highlights the need for improved cybersecurity measures to safeguard the accuracy and integrity of digital voting systems.

Concerns are also raised about the neutrality and transparency of global media platforms. It is alleged that these platforms may show bias by taking sides in conflicts, potentially undermining their neutrality. Secret recommendation algorithms used by these platforms can influence users’ news feeds, and this lack of transparency raises questions about the information users are exposed to and the influence these algorithms can have on public perception. The analysis also notes that in certain African countries, platforms like Facebook serve as the primary source of internet access for many individuals, highlighting the importance of ensuring fair and unbiased information dissemination.

Transparency in global media platforms’ recommendation algorithms is deemed necessary. The analysis argues that platforms like Facebook have the power to ignite revolutions and shape public discourse through these algorithms. However, the lack of understanding about how these algorithms work raises concerns about their impact on democratic processes and the formation of public opinion.

The analysis also highlights the challenges of accessing data for academic and civil society research, without specifying the nature or extent of these challenges. It takes the position that measures need to be taken to fight against data access restrictions in order to promote open access and support research efforts in these fields.

The integrity of Russia’s electronic voting systems is called into question, despite the Russian Central Election Commission not acknowledging any issues. These systems, developed by big tech companies Kaspersky and Rostelecom, lacked transparency and did not comply with the recommendations of the Russian Commission, raising doubts about their reliability and potential for manipulation.

The use of social media platforms, particularly Facebook, for political campaigning in restrictive political climates is also deemed ineffective. The analysis argues that these platforms may not effectively facilitate individual political campaigns. Supporting facts are provided, such as limited reach and targeting capabilities of Facebook’s advertising algorithms and the inability to use traditional media advertisements in restrictive regimes. An audience member with experience managing a political candidate page on Facebook shares their negative experience, further supporting the argument that social media platforms may not be as effective as traditional methods in certain political contexts.

In conclusion, the analysis presents a range of concerns regarding the vulnerabilities of digital election systems, the neutrality and transparency of global media platforms, challenges in data access for research, and the integrity of Russia’s electronic voting systems. It emphasizes the need for enhanced cybersecurity measures, transparency in recommendation algorithms, increased support for data access in research, and scrutiny of electronic voting systems. These issues have significant implications for democracy, public opinion, academic progress, and political campaigning in an increasingly digital and interconnected world.

Ashnah Kalemera

Social media platforms and the internet have the potential to play a significant role in electoral processes. They can support various aspects such as voter registration, remote voting, campaigns, voter awareness, results transmission, and monitoring. These platforms are critical in ensuring that voter registration is complete and accurate, enabling remote voting for excluded communities and remotely based voters, supporting campaigns and canvassing, as well as voter awareness and education, facilitating results transmission and tallying, and monitoring malpractice.

However, technology also poses threats to electoral processes, especially in Africa. Authoritarian governments leverage the power of technology for their self-serving interests. They actively use disinformation and hate speech to manipulate narratives and public opinion during elections. Various actors, including users, governments, platforms themselves, private companies, and PR firms, contribute to this manipulation by spreading disinformation and hate speech.

The thriving of disinformation and hate speech in Africa can be attributed to the increasing penetration of technology on the continent. This provides a platform for spreading false information and inciting hatred. Additionally, the growing youth population, combined with characteristic ethnic, religious, and geopolitical conflicts, creates an environment where disinformation and hate speech can flourish.

To combat the spread of disinformation, it is crucial for big tech companies to collaborate with media and civil society. However, limited collaboration exists between these actors in Africa, and concerns arise regarding the slow processing and response times to reports and complaints, as well as the lack of transparency in moderation measures.

Research, consultation, skill-building, and strategic litigation are identified as potential solutions to address the challenges posed by big tech’s involvement in elections and the spread of disinformation. Evidence-driven advocacy is important, and leveraging norm-setting mechanisms can help raise the visibility of these challenges. Challenging the private sector to uphold responsibilities and ethics, as outlined by the UN guiding principles on business and human rights, is also essential.

Addressing the complex issues surrounding big tech, elections, and disinformation requires a multifaceted approach. While holding big tech accountable is crucial, it is important to recognize that the manifestations of the problem vary from one context to another. Therefore, stakeholder conversations must acknowledge and address the different challenges posed by disinformation.

Data accessibility plays a critical role in addressing these issues. Organizations like CIPESA have leveraged data APIs for sentiment analysis and monitoring elections. However, the lack of access to data limits the ability to highlight challenges related to big tech involvement in elections.

Furthermore, it is important to engage with lesser-known actors, such as electoral bodies and regional economic blocs, to effectively address these issues. Broader conversations that include these stakeholders can lead to a better understanding of the challenges and potential solutions.

In conclusion, social media platforms and the internet offer significant potential to support electoral processes but also pose threats through the spread of disinformation and hate speech. Collaboration between big tech, media, and civil society, as well as research, skill-building, and strategic litigation, are necessary elements in addressing these challenges. Holding big tech accountable and engaging with lesser-known actors are also crucial for effective solutions.

Moderator – Bruna Martins Dos Santos

Digital Action is a global coalition for tech justice that aims to ensure the accountability of big tech companies and safeguard the integrity of elections. Headquartered in Brazil, the coalition has been gaining support from various organizations and academics, indicating a growing momentum for their cause.

Founded in 2019, Digital Action focuses on addressing the impact of social media on democracies and works towards holding tech giants accountable for their actions. Their primary objective is to prevent any negative consequences on elections and foster collaboration by involving social media companies in the conversation.

Moreover, Digital Action seeks to empower individuals who have been adversely affected by tech harms. They prioritize amplifying the voices of those impacted and ensuring that their concerns are heard. Through catalyzing collective action, bridge-building, and facilitating meaningful dialogue, they aim to make a positive difference.

On a different note, the summary also highlights the criticism faced by social media companies for their lack of investment in improving day-to-day lives. This negative sentiment suggests that these companies may not be prioritizing initiatives that directly impact people’s well-being and societal conditions.

In conclusion, Digital Action’s global coalition for tech justice is committed to holding big tech accountable, protecting election integrity, and empowering those affected by tech harms. By involving social media companies and gaining support from diverse stakeholders, they aspire to create a more just and inclusive digital landscape. Additionally, the need for social media companies to invest in initiatives that enhance people’s daily lives is emphasized.

Yasmin Curzi

The legislative scenario in Brazil concerning platform responsibilities is governed by two main legislations. The Brazilian Civil Rights Framework, established in 2014, sets out fundamental principles for internet governance. According to Article 19 of this framework, platforms are only held responsible for illegal user-generated content if they fail to comply with a judicial order. The Code of Consumers Defense also recognises users as being vulnerable in their interactions with businesses.

However, the impact of measures to combat false information remains uncertain. Although platforms have committed to creating reporting channels and labelling content related to elections, there is a lack of detailed metrics to fully understand the effectiveness of these measures. There are concerns about whether content is being removed quickly enough to prevent it from reaching a wide audience. One concerning example is the case of Jovem Pão, which disseminated a fake audio during election day that had already been viewed 1.7 million times before removal.

The analysis indicates that social media and platforms’ content moderation have limited influence on democratic elections. Insufficient data and information exist about platforms’ actions and their effectiveness in combating false information. Content shared through official sources often reaches a wide audience before it is taken down. Despite partnerships with fact-checking agencies, it remains uncertain how effective platform efforts are in combating falsehood.

There is a pressing need for specific legislation and regulation of platforms to establish real accountability. Platforms currently fail to provide fundamental information such as their investment in content moderation. However, there is hope as the Data, Consumer Protection, and Regulation (DCPR) initiative has developed a framework for meaningful and interoperable transparency. This framework could guide lawmakers and regulators in addressing the issue.

Furthermore, platforms should improve their content moderation practices. Journalists in Brazil have requested information from Facebook and YouTube regarding their investment in content moderation but have received no response. Without the ability to assess the harmful content recommended by platforms, it becomes difficult to formulate appropriate public policies.

In conclusion, the legislative framework in Brazil regarding platform responsibilities comprises two main legislations. However, the impact of measures to combat false information remains uncertain, and the influence of social media and platform content moderation on democratic elections is limited. Specific legislation and regulation are needed to establish accountability, and platforms need to enhance their content moderation practices. Providing meaningful transparency information will facilitate accurate assessment and policymaking.

Alexandra Robinson

The vulnerability of online spaces and the ease with which domestic or foreign actors can manipulate and spread falsehoods is a growing concern, especially in terms of the manipulation of democratic processes. The use of new technologies like generative AI further complicates the issue, making it easier for malicious actors to deceive and mislead the public. This highlights the urgent need for stronger protections against online harms.

One significant observation is the glaring inequality between different regions in terms of protections from online harms. The disparity is particularly alarming, emphasizing the need for a more balanced and comprehensive approach to safeguarding online spaces. It is crucial to ensure that individuals worldwide have equitable protection against manipulation and disinformation.

Social media companies play a pivotal role in creating safe online environments for all users. This is particularly important with the upcoming 2024 elections, as these companies must fulfill their responsibilities to protect the integrity of democratic processes. However, concerns arise when examining the allocation of resources by these companies. Despite investing $13 billion in platform safety since 2016, Facebook’s use of its global budget for combating false information appears disproportionately focused on the US market, where only a fraction of its users reside. This skewed allocation raises questions regarding the equal treatment of users globally and the effectiveness of combating disinformation on a worldwide scale.

Furthermore, non-English languages pose a significant challenge for automated content moderation on various platforms, including Facebook, YouTube, and TikTok. Difficulties in moderating content in languages other than English can lead to a substantial gap in combating false information and harmful content in diverse linguistic contexts. Efforts must be made to bridge this gap and ensure that content moderation is effective in all languages, promoting a safer online environment for users regardless of their language.

In conclusion, the vulnerability of online spaces and the potential manipulation of democratic processes through the spread of falsehoods raise concerns that require urgent attention. Social media companies have a responsibility to create safe platforms for users worldwide, with specific emphasis on the upcoming elections. Addressing the inequities in protections against online harms, including the allocation of resources and challenges posed by non-English languages, is crucial for maintaining the integrity of online information and promoting a more secure digital environment.

Lia Hernandez

The speakers engaged in a comprehensive discussion regarding the role of digital platforms in promoting democracy and facilitating access to information. They emphasized the importance of independent tech work to advance digital rights across all Central American countries. Additionally, they highlighted the collaboration between big tech companies and electoral public entities, as the former provide tools to ensure the preservation of fundamental rights during election processes.

The argument put forth was that digital platforms should serve as valuable tools for promoting democracy and facilitating access to information. This aligns with the related United Nations Sustainable Development Goals, including Goal 10: Reduced Inequalities and Goal 16: Peace, Justice, and Strong Institutions.

However, concerns were raised about limitations on freedom of the press, information, and expression. Journalists in Panama faced obstacles and restrictions when attempting to communicate information of public interest. Of particular concern was the fact that the former President, Ricardo Martinelli, known for violating privacy, is a candidate for the next elections. This situation has the potential to lead to cases of corruption.

Furthermore, the speakers emphasized the necessity of empowering citizens, civil society organizations, human rights defenders, and activists. They argued that it is not only important to strengthen the electoral authority but also crucial to empower the aforementioned groups to ensure a robust and accountable democratic system. The positive sentiment surrounding this argument reflects the speakers’ belief in the need for a participatory and inclusive democracy.

However, contrasting viewpoints were also presented. Some argued that digital platforms do not make tools widely available to civil society but instead focus on providing them to the government. This negative sentiment highlights concerns about the control and accessibility of these tools, potentially limiting their efficacy in promoting democracy and access to information.

Additionally, the quality and standardisation of data used for monitoring digital violence were subject to criticism. The negative sentiment regarding this issue suggests that the data being utilised is unclean and lacks adherence to open data standards. Ensuring clean and standardised data is paramount to effectively monitor and address digital violence.

In conclusion, the expanded summary highlights the various perspectives and arguments surrounding the role of digital platforms in promoting democracy and access to information. It underscores the importance of independent tech work, collaboration between big tech companies and electoral entities, and empowering citizens and civil society organisations. However, limitations on freedom of the press, potential corruption, restricted access to tools, and data quality issues represent significant challenges that need to be addressed for the effective promotion of democracy and access to information.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Promoting the Digital Emblem | IGF 2023 Open Forum #16

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Koichiro Komiyama

According to a report by the IISS, several Asian countries, including China, Australia, India, Indonesia, Iran, North Korea, and Vietnam, are significantly increasing their cybersecurity capabilities. This development has raised concerns about the escalation of cybersecurity capabilities in Asia.

Ransomware attacks have been on the rise, with damages increasing, and many of these attacks being driven by commercial profit. Over the past year, there have been successful breaches of critical infrastructure, such as hospitals. This highlights the vulnerability of essential services to cyber threats.

Japan, traditionally known for refraining from cyber offense due to its peace constitution, has changed its stance on cyber offense in light of national security concerns. This shift in policy indicates that Japan is recognising the need to enhance its cybersecurity capabilities.

To combat cybercriminal activities, the application of guidelines or emblems is suggested as a method to pressure criminal groups regarding their operations. Such guidelines can establish a framework for acceptable behaviour, discouraging criminal activities in cyberspace.

Koichiro Komiyama, a prominent individual in the field, has expressed concerns about cybersecurity threats specifically targeting hospital and medical systems. He emphasises the need for proactive measures to safeguard vital systems against evolving cyber threats.

Moreover, the implementation of local environment concepts for critical systems is considered crucial. Critical systems, whose offline or disconnected nature makes them less vulnerable to cyber attacks, do not use global IP address spaces or associate with any domain name. Implementing these concepts enhances the security of such systems.

Overall, the increasing cybersecurity capabilities of several Asian countries, coupled with the rise in ransomware attacks and successful breaches of critical infrastructure, highlight the urgent need for robust cybersecurity measures. It is essential to address cybersecurity threats to hospital and medical systems. Furthermore, the adoption of local environment concepts can enhance the security of critical systems.

Audience

During the discussion, concerns were raised about the offensive cyber capabilities that AI is reportedly enhancing. Automation and AI have increased the speed of cyber capabilities, leading to growing apprehension. The feasibility and effectiveness of the digital emblem solution were questioned, specifically regarding its ability to deal with the accelerated speed and wider reach of cyber capabilities. Doubts were expressed regarding whether cyber capabilities would take the time to verify the authenticity of digital emblems.

The discussion emphasized the need for strong interest from states and sub-state organizations in the digital emblem solution. The successful implementation and socialization of the solution require a strong appetite among these entities. Incentives were identified as necessary to encourage their engagement with the digital emblem solution. Additionally, the degree of interest among states and sub-state organizations was discussed, highlighting the importance of incentivizing their involvement.

The issue of incentivizing non-state actors and less organized groups to respect digital emblems was also raised. There was an example of activists in Russia and Ukraine pledging to reduce the scale of their cyber operations, indicating some willingness to comply. However, motivating these actors to fully respect and adhere to digital emblems remains a challenge.

Attribution problems and issues with incentivizing state actors were discussed. It was argued that problems with incentives and attribution could discourage state actors from respecting the digital emblem. This could potentially make emblem violations easier without clear attribution to a specific state.

The visibility of hospital targeting in the Asia-Pacific region was highlighted as evidence of the urgent need for the proposed emblem. Hospitals in this region are targeted by nation-states on a daily basis, underscoring the necessity of finding a solution to prevent such attacks.

The discussion also touched upon the self-regulation within the criminal community. It was mentioned that the criminal community regulates itself against targeting perceived “soft targets.” This suggests that there may be a deterrent effect that discourages criminals from attacking certain entities.

Finally, the potential role of Internet Service Providers (ISPs) in validating adherence to the digital emblem was suggested. ISPs possess the ability to identify operational nation-states and their infrastructure, which could provide insights into whether the emblem rules are being followed.

Overall, the discussions highlighted various challenges and concerns related to offensive cyber capabilities, the feasibility of the digital emblem solution, and the imperative of strong engagement from different actors. The importance of incentivizing compliance and addressing attribution issues was emphasized. The visibility of hospital targeting and the potential role of ISPs were also significant points of discussion.

Felix Linker

The ADEM (Authentic Digital Emblem) system, developed by Felix Linker and his team, is a technological solution designed to address the need for verifiable authenticity and accountability in the digital landscape. It was developed in response to a request from the International Committee of the Red Cross (ICRC) for a digital emblem. The purpose of ADEM is to provide a reliable and tamper-proof method of identification and endorsement for protected parties.

ADEM is designed to be a plug-in to the infrastructure of protected parties, such as the ICRC, allowing for the autonomous distribution of emblems. Prototyping is ongoing with the ICRC, and plans are in place to deploy ADEM within their network. This move is seen as a positive step towards enhancing cybersecurity and supporting the mission of protected parties.

One key aspect highlighted in the discussions is the role of nation-states in endorsing protected parties. ADEM allows nation-states to make sovereign decisions regarding the endorsement of protected parties, and emblems will be accompanied by multiple endorsements from nation-states. This approach empowers nation-states to exercise control and support protected missions according to their individual preferences and policies. It is considered a positive development in promoting digital sovereignty and aligning with the goals of SDG 16 (Peace and Justice) and SDG 9 (Industry, Innovation, and Infrastructure).

However, challenges arise when it comes to verifying endorsement requests. Felix Linker raises concerns about technical organizations that control parts of the internet naming system, such as ICANN. He believes that these organizations may struggle to authenticate requests for endorsement due to their technical nature. This argument carries a negative sentiment as it highlights a potential limitation in the current system.

In light of these challenges, Felix suggests that endorsement of protected parties could be undertaken by nation-states, supranational organizations, or entities with relevant experience and knowledge in the field, such as the ICRC. He emphasizes the importance of not burdening technical organizations with additional responsibilities that may not align with their expertise. This perspective is seen as positive as it suggests a more suitable and effective approach to securing endorsements for protected missions.

ADEM consists of two main components. The first component focuses on protecting entities identified using IP addresses and domain names. This aspect of ADEM aims to provide security and authenticity at the network level. The second component involves granting emblems through mechanisms such as TLS, UDP, and DNS. These mechanisms serve as a means to validate and authenticate the emblems, ensuring their authenticity and reliability. This dual aspect of ADEM showcases its comprehensive approach to safeguarding the integrity and authenticity of protected parties.

Felix’s team is also working on the development of local emblems, which aim to protect against threats at the device level. By addressing vulnerabilities such as malicious email attachments and network penetrations, this extension of ADEM provides an extra layer of security and ensures a holistic approach to safeguarding digital assets and missions.

Moreover, the discussions highlight the benefits of emblems in monitoring and reducing cyber attacks. Emblems serve as a mechanism for verifying the authenticity and legitimacy of actors engaging in cyber activities. By recognizing and respecting emblems, actors can be monitored more effectively to prevent and mitigate potential cyber threats. This observation carries a neutral sentiment as it reflects the potential of emblems in enhancing cybersecurity efforts.

Lastly, the proposition of Internet Service Providers (ISPs) taking on the responsibility of monitoring emblem distribution is viewed positively. Felix suggests that ISPs could play a crucial role in regularly checking whether emblems are being sent out as intended. This proposed role for ISPs aligns with SDG 16 and SDG 9 and potentially enhances the effectiveness of emblem distribution and validation.

In conclusion, the development of the ADEM system presents a promising solution for achieving authenticity and accountability in the digital realm. By allowing the autonomous distribution of emblems within the infrastructure of protected parties, ADEM promotes enhanced cybersecurity and supports protected missions. The involvement of nation-states and the consideration of various endorsement mechanisms further strengthen the system’s reliability and effectiveness. However, challenges exist in verifying endorsement requests, particularly concerning technical organizations’ ability to authenticate requests. The development of local emblems and the potential role of ISPs in monitoring emblem distribution offer additional layers of protection and monitoring. Overall, ADEM holds great potential for advancing digital security, ensuring authenticity, and supporting the goals of SDG 16 and SDG 9.

Moderator – Michael Karimian

The digital emblem is an innovation in humanitarian protection aimed at extending protections into the digital realm. Its purpose is to safeguard medical and humanitarian entities from cyber operations. This concept acknowledges the evolving nature of warfare and conflict, where cyber operations play an increasingly impactful role. By implementing the digital emblem, these entities can continue their work without fear of cyber operations.

Furthermore, the digital emblem represents a collective commitment to protecting the vulnerable from cyber threats. It highlights the intersection of technology, cybersecurity, and humanitarian protection, emphasizing the need for collaboration and advanced measures to ensure a secure digital future. This collective commitment signifies the importance of addressing cyber threats within the broader context of humanitarian efforts.

Applying multi-factor authentication and zero-trust principles can significantly enhance cybersecurity. Studies have shown that 99% of cyber-attacks can be prevented by adopting basic cybersecurity practices, including these two measures. By implementing multi-factor authentication, which requires multiple forms of verification for access, and following the zero-trust approach, which assumes no trust by default and verifies every action, organizations can greatly increase their cybersecurity resilience.

Keeping systems updated and employing data protection measures through encryption are also essential in minimizing the risks posed by cyber attacks. By ensuring that software and patches are up to date, organizations can protect themselves from known vulnerabilities. Additionally, encryption provides an added layer of security by securing sensitive data and making it unreadable to unauthorized parties.

To bolster cybersecurity efforts, it is encouraged for tech and telecommunications companies to join initiatives such as the Cyber Security Tech Accord and the Paris Call for Trust and Security in Cyberspace. The Cyber Security Tech Accord is a coalition of approximately 150 members committed to best practices and principles of responsible behavior in cyberspace. The Paris Call for Trust and Security in Cyberspace is the largest multi-stakeholder initiative aimed at advancing cyber resilience. By becoming part of these initiatives, companies can contribute to collective efforts in maintaining a secure cyber environment.

Engaging with the Cyber Peace Institute can also aid in improving cybersecurity. The Cyber Peace Institute focuses on promoting norms and advocating for responsible behavior in cyberspace. Collaborating with this institute can provide valuable insights and resources to enhance cybersecurity practices.

In the context of protecting medical facilities and humanitarian organizations, a multidimensional approach is required. This includes implementing technical solutions, fostering collaboration among various stakeholders, conducting research, and advocating for enhanced protection. The challenges and potential solutions in safeguarding these facilities and organizations were discussed, emphasizing the importance of research and advocacy in the process.

The significance of audience engagement and the contributions of the speakers were acknowledged in supporting the protection of medical facilities and humanitarian organizations. These discussions underline the critical importance of ensuring the safety of these entities, as the consequences of attacks can be just as devastating as physical assaults.

Overall, the digital emblem represents a critical innovation in humanitarian protection, offering safeguards against cyber operations for medical and humanitarian entities. By promoting the intersection of technology, cybersecurity, and humanitarian protection, advocating for best practices and responsible behavior, and implementing advanced cybersecurity measures, organizations can enhance their resilience against cyber threats. Collaboration, research, and advocacy are also essential in protecting medical facilities and humanitarian organizations. By joining together and adopting comprehensive strategies, we can create a more secure and resilient digital space.

Mauro Vignati

The International Committee of the Red Cross (ICRC) considers the digitalization of the emblem to be crucial and necessary. The digital emblem is used to identify medical personnel, units, and organizations, providing a means of recognition during armed conflicts. The ICRC argues for flexibility in the usage of the digital emblem, limiting its use to selected entities solely during times of armed conflict.

Initiated in response to the need for increased protection during armed conflicts and the COVID-19 pandemic, the ICRC began researching the digitalization of emblems. The digital emblem aims to provide security for medical facilities and Red Cross organizations.

Several technical requirements have been defined to ensure the effectiveness of the digital emblem. Ease of deployment, compatibility with different devices, and the ability to verify authenticity are among the key considerations. It is essential that the emblem can be utilized by both state and non-state actors.

Despite the benefits of the digital emblem, there are various challenges associated with its implementation. Such challenges include the lack of separate internet infrastructure for armed forces and civilians, difficulties in modifying medical devices, and the complex nature of the internet environment.

To develop the digital emblem, the ICRC consulted with 44 experts, initiating the project in 2020. This endeavor holds promise in reducing misuse through technological advancements. However, it is important to note that the authority to authorize the emblem’s use in physical space lies with the state, as stipulated by the Geneva Convention.

Both state and non-state actors are expected to comply with the conventions, including the digital emblem. The Red Cross actively appeals to non-state actors to adhere to International Humanitarian Law (IHL), as violation of IHL could be deemed a war crime.

In conclusion, the digitalization of the emblem is deemed vital in order to enhance protection in both physical and digital realms. The objective is to educate non-state actors on the significance of respecting IHL and the emblem to ensure the safeguarding of humanitarian efforts. Nevertheless, it is imperative to further assess the challenges and potential risks associated with the digital emblem.

Francesca Bosco

The Cyber Peace Institute was established with the goal of mitigating the adverse effects of cyber attacks on people’s lives worldwide. It plays a crucial role in aiding vulnerable communities to stay safe in cyberspace, conducting investigations and analysis on cyber attacks, advocating for improved cybersecurity standards and regulations, and addressing emerging technological challenges.

The healthcare sector is identified as a particularly vulnerable sector to cyber attacks, which often lead to the loss of data and disruption of services. The Cyber Peace Institute has a platform that documents cyber attacks on the health sector, highlighting the breach of over 21 million patient records and significant disruption to healthcare services. This demonstrates the urgent need for improved cybersecurity measures within the healthcare industry.

Cyber attacks during armed conflicts have a significant human impact as they threaten crucial services and spread disinformation. The borderless nature of cyberspace allows cyber operations to extend beyond belligerent countries, hitting critical infrastructures in third countries. This highlights the need for increased international cooperation and measures to protect critical services during armed conflicts.

Risks in the medical and humanitarian sectors include the increasing accessibility of sophisticated malware and ready-to-use cyber tools, as well as the blurring line between state and non-state actors. This presents a challenge as it lowers the barriers to entry for malicious actors and makes it difficult to attribute attacks to a specific entity. Thus, it is essential to develop strategies to effectively address these risks and protect vital infrastructures.

Education is identified as a vital component in understanding the importance of protecting healthcare and humanitarian organizations from cyber attacks. By educating different stakeholders, including professionals and the general public, they can better comprehend the potential consequences of not safeguarding these crucial infrastructures.

Francesca Bosco, an advocate in the field, emphasizes the need for analyzing the human impact of cyber attacks and the long-term consequences in order to underline the importance of protecting vital infrastructures. Efforts are being made to standardize a methodology to measure the societal harm from cyber attacks. The aim is to monitor responsible behavior in cyberspace and assess the societal costs of not adequately protecting vital infrastructure.

Basic cyber hygiene activities and information sharing are identified as critical elements in mitigating cyber attacks and improving cybersecurity. It has been found that 99% of cyber attacks can be stopped by implementing basic cyber hygiene practices. Additionally, full cooperation in terms of information sharing is needed to effectively trace and address cyber incidents, as seen in the case of the healthcare sector.

Civil society organizations are recognized for their close proximity to the people impacted by cyber attacks and their firsthand experiences. These organizations can play active roles in advancing knowledge and efforts in mitigating cyber attacks, working in collaboration with other stakeholders to address the challenges posed by cyber threats.

Sharing defense resources and enhancing cyber capacity building are recommended as important measures for protecting critical infrastructure. This can be achieved through initiatives such as the Global Cyber Capacity Building Conference, which focuses on the protection of critical infrastructure from cyber attacks.

In conclusion, the Cyber Peace Institute is at the forefront of efforts to mitigate the harmful effects of cyber attacks globally. Through its various activities, such as aiding vulnerable communities, investigating cyber attacks, advocating for better cybersecurity standards, and addressing emerging technological challenges, the Institute works to protect vital infrastructures, such as healthcare and humanitarian organizations. It is evident that education, cooperation, and capacity building are essential elements in effectively addressing cyber threats and safeguarding critical services. By understanding the human impact and long-term consequences of cyber attacks, there is a growing recognition of the need to protect vital infrastructure and develop strategies to mitigate cyber risks.

Tony

Tony highlights the necessity of a digital emblem in order to uphold International Humanitarian Law. This emblem should protect the end system data, its processing, and the communications involved. Moreover, it should be visible to those individuals who are committed to complying with international humanitarian law. Significantly, the digital emblem should not burden the operations of humanitarian organizations.

Tony suggests implementing the digital emblem by leveraging existing Internet infrastructure and technology. The internet has the capability to employ cryptographic methods to safeguard fundamental data. Critical data, such as naming and addressing required to operate the internet, can be protected through technology that is already established.

To implement the digital emblem, Tony proposes an implementation approach using secure DNS and secure routing. This approach involves inserting a special text record within the DNS record, which is signed by a trusted entity to validate the emblem. Additionally, visible blocks of address can be segregated to accommodate humanitarian traffic flows.

International cooperation is crucial for the successful implementation of the digital emblem. Nation-states have the responsibility to regulate the use of the emblem, and working through existing organizations like the ICRC can facilitate the process.

Tony argues that regional internet registries should take on more responsibility for verifying the authenticity of humanitarian missions, rather than relying solely on ICANN. This is particularly important because regional internet registries are better equipped to verify humanitarian organizations compared to ICANN, particularly in countries where there is a close coupling between the internet operator and the state, such as Egypt and China.

Coupling the verification of the humanitarian emblems with the operations of the internet can make the system more scalable. Tony suggests using DNS to propagate the emblem, rather than verify it, to make the process manageable. This can be achieved by having a local ISP or an organization like the American Red Cross sign the digital record within the DNS record.

The control of internet operations by the state is not universally applicable, and it varies among countries. In the United States, the government has little involvement in how names and numbers are allocated, whereas in countries like Egypt and China, the internet operator and the state have a close coupling.

There is a concern about the risk of unintended consequences and disruptions to humanitarian missions resulting from cyber attacks. Unintended denial of service attacks can occur if focus is only placed on the attacked entity, and nation-state attacks often focus on the infrastructure rather than individual users.

Protective measures should rely on internet infrastructure for third-party queries, instead of solely relying on potentially attacked endpoints. This proposed solution aims to mitigate the risks of cyber attacks by utilizing the infrastructure of the internet for third-party queries.

While basic cyber hygiene is essential, it is not a complete solution to cyber attacks. Existing technology can mitigate many damaging attacks, but sophisticated adversaries and high-value targets require more comprehensive defense strategies. To address this, authorities, whether legal or ethical, should promote and normalize cyber hygiene practices.

Transparency and collective action can help expose and deter malicious activity. Initiatives tied to scalable internet infrastructure can be repurposed for monitoring and responding to digital threats. Adversarial activities against sensitive institutions like hospitals and public utilities should be observable and provokable.

The current mechanisms and applications for protecting humanitarian operations in conflict zones should be expanded to other environments, even in peacetime. Ransomware attacks on peacetime institutions, such as hospitals, pose significant threats that current cybersecurity measures may not adequately address. Implementing existing security mechanisms sector by sector is challenging and impractical.

In conclusion, Tony emphasises the need for a digital emblem to respect International Humanitarian Law. Implementing this emblem by leveraging existing Internet infrastructure and technology, using secure DNS and secure routing, and ensuring international cooperation are vital for its success. Regional internet registries should play a larger role in verifying humanitarian missions, and coupling the verification process with internet operations can make the system more scalable. Cyberattacks pose a risk to humanitarian missions, and protective measures should rely on internet infrastructure. While basic cyber hygiene is important, more comprehensive defense strategies are needed for sophisticated adversaries. Transparency and collective action can help deter malicious activity, and mechanisms for protecting humanitarian operations should be expanded to other environments.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Planetary Limits of AI: Governance for Just Digitalisation? | IGF 2023 Open Forum #37

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Martin Wimmer

The analysis explores various perspectives on digital transformation, sustainability, and the environmental impact of technology. One speaker emphasises the need for a human-centric approach to digital transformation, focusing on improving individuals’ lives and preserving the integrity of the Earth. They draw on the metaphor of the Japanese rock garden to describe our relationship with technology. Additionally, they highlight the importance of considering sustainable development goals and respecting human rights in the use of technology.

Another speaker argues that digitalisation and technology should promote sustainable development goals and uphold human rights. They point out that the German development policy supports the realisation of human rights, protection of climate and biodiversity, gender equality, fair supply chains, and other important aspects. They propose that a just transition to sustainable economies requires a nurturing approach rather than exploitative practices, drawing parallels with being a “gardener.”

However, concerns are raised about the environmental damage caused by artificial intelligence (AI). The negative sentiment towards AI’s impact on the environment is highlighted, suggesting that we are currently in a state of repair. Similarly, the negative sentiment towards the industry’s lack of concern for the environmental impact of their activities is expressed. The argument is made that industry needs to consider the environmental impact, aligning with the sustainable development goals related to responsible consumption and production.

The analysis also addresses the lag in legislation and regulation related to technology. The negative sentiment is expressed, stating that legislation and regulation are often implemented too late. The need for learning and better preparedness for future technologies is emphasised, as well as the positive sentiment towards gaining knowledge from the mistakes of the past.

The role of civil society and non-governmental organisations (NGOs) in exerting pressure is highlighted as a means to drive change. The positive sentiment towards the pressure from civil society and NGOs is expressed, suggesting that their involvement is crucial in advancing sustainability and human rights.

The transformation of the internet is discussed, with references to its evolution from interconnected networks to the oldest among digital technological artifacts. The neutral sentiment is expressed towards the internet, implying that it can neither be deemed good nor bad. Instead, the focus is on the internet’s role as a foundation for various digital technologies, with artificial intelligence being considered the most recent incarnation.

Overall, the analysis highlights the importance of considering sustainability, human rights, and the environment in digital transformation and technological advancements. It also underscores the need for a human-centric approach, better industry practices, improved legislation and regulation, preparedness for future technologies, and the involvement of civil society and NGOs in driving positive change. The varying perspectives shed light on the different aspects and challenges associated with digital transformation and its impact on society and the environment.

Audience

The analysis explores different perspectives on technology development, highlighting concerns, and advocates for a proactive approach. The concerns revolve around the necessity and impact of new technologies, with a particular focus on the harms and risks faced by certain communities. It is noted that significant investments are being made in technology development, but there is a need to address the potential negative consequences associated with these advancements.

One argument raised is the need to rethink the ideology and narrative of growth and development. There is a call to move away from the traditional approach and consider alternative ways of achieving progress. The emphasis is on the importance of responsible consumption and production, as well as considering the long-term sustainability of new technologies.

Another perspective suggests that countries from the Global South are not prioritising sustainability and climate protection over digitalisation. It is argued that these nations should focus on addressing environmental concerns and ensure that technological advancements align with sustainable development goals. This observation highlights the need for a balanced approach to technology adoption and an emphasis on considering the environmental impacts.

The analysis also highlights the existing digital divide, with the most advanced centres of research and development and influential companies predominantly located outside the Global South. This observation points to the power dynamics in the technology sector, indicating that decision-making and agenda-setting are often controlled by entities outside the Global South. This imbalance calls for efforts to bridge the digital divide and empower the Global South to have a greater say in shaping the technological landscape.

In conclusion, the analysis presents a range of perspectives on technology development. It underscores concerns regarding the impact of new technologies, calls for a re-evaluation of growth narratives, emphasises the need to prioritise sustainability, and highlights the inequality in the technology sector. The analysis also suggests that a proactive approach is necessary to address the challenges and potential negative consequences associated with technology development. Overall, it provides valuable insights into the complexities of technology’s role in society and the need for a more balanced and responsible approach.

Siriwat Chhem

This analysis examines the challenges and progress of sustainable AI in Cambodia. Cambodia has experienced impressive economic growth, with an annual GDP growth rate of 7% over the past 20 years. The country also benefits from a young population, with two-thirds under the age of 30. The availability of affordable mobile data and Wi-Fi has accelerated digitisation in Cambodia. Moreover, Cambodia has bypassed card payments and adopted mobile payments directly.

However, Cambodia currently lacks specific policies on AI and sustainable AI. The country is learning from regional models and others’ mistakes to develop its own AI framework. Civil society, represented by AVI Asian Vision Institute, plays a crucial role in Cambodia’s sustainable AI development by providing policy research and capacity building in the digital economy. The institute also focuses on Cambodia’s role as a small state in global governance.

Efficiency evaluation of AI tools and platforms is important as the misconception that AI can solve everything comes at a high cost and can create more problems. Long-term partnerships and continuous engagement are essential in addressing global issues related to AI and sustainability. However, there is a challenge of lack of follow-up and building on discussed points after high-level international conferences.

AI and sustainability are long-term journeys that require careful legislation and policy development. Backtracking or catching up from a regulatory standpoint is difficult due to the established nature of AI and sustainability. It is crucial to consider the broader implications of AI beyond just the technology itself.

In conclusion, Cambodia needs comprehensive policies on sustainable AI while capitalising on its progress in digitisation. Civil society, particularly AVI Asian Vision Institute, plays a vital role in advancing the digital economy. Evaluating the efficiency of AI tools, advocating for long-term partnerships, and focusing on sustainable solutions are crucial for sustainable AI in Cambodia.

Robert Opp

Digitalization and climate change are identified as the biggest global mega-trends. Developing countries bear a disproportionate burden of climate change and face challenges in terms of digitalization. Although digitalization presents the opportunity for positive action against climate change, it is also contributing to carbon emissions.

Environmental regulations and governance should not be sidelined in the pursuit of rapid digitalization. It is important that countries prioritize reducing data centre inefficiency and addressing the issue of e-waste. The global north, as a major contributor to technology development, has a responsibility to ensure that the environmental impact of these technologies is minimized.

Forming alliances in global digital governance is crucial. Initiatives such as the Coalition for Digital Environmental Sustainability (COBE) and the AI for the Planet Alliance aim to foster political alignment and promote sustainable approaches in the digital sphere. These alliances recognize the importance of involving diverse stakeholders including the private sector, civil society, and governments.

The value of local digital ecosystems and capacity building is emphasized for addressing sustainability issues. The global pattern of AI systems often lacks representation and diversity, and local innovators may struggle with financing, skillsets, and access to tools for building locally relevant systems. Strengthening local digital ecosystems can lead to fresh ideas and innovative solutions for sustainability.

Concerns are raised about the lack of representation and diversity in AI systems, particularly generative AI. The underlying data, or lack thereof, and the training processes contribute to this issue. It is important to address this lack of diversity to ensure that AI systems are fair, inclusive, and do not perpetuate biases or discrimination.

Developing countries may face challenges in prioritising environmental issues due to limited resources. However, it is important to recognise that the current pattern of environmental issues was created primarily by countries of the global north. It is crucial for these countries to take responsibility and work towards mitigating their impact on the environment.

Advising country partners to consider environmental implications in digitalization is a key recommendation. Technology should serve people and the planet, rather than exploiting or harming them. The process of digital inclusion and transformation should continue while not forgetting the importance of environmental considerations.

In conclusion, the extended analysis highlights the need for a balanced approach to digitalization and climate change. Environmental regulations and governance should not be overlooked, and alliances in global digital governance are crucial for promoting sustainability. The importance of local digital ecosystems, diversity in AI systems, and capacity building is emphasized. Furthermore, the responsibility for environmental issues should be acknowledged and addressed by countries of the global north. Ultimately, technology should be used as a tool to benefit both people and the planet.

Moderator – Karlina Octaviany

The IGF 2023 Open Forum 37 focused on the topic of sustainable development in relation to ICT technologies, with a particular focus on artificial intelligence (AI). The discussion aimed to address the ecological and social risks associated with the rapid digital transformation.

The panel of speakers included representatives from diverse organisations, such as the German Federal Ministry for Economic Cooperation and Development, UNDP, Mozilla Corporation, ITU, and the Asian Vision Institute. These experts shared valuable insights and examples of initiatives aiming to integrate sustainability in ICT technologies and global digital governance, specifically focusing on AI.

One important aspect highlighted during the forum was the need to limit the ecological impact of digital technologies. The panelists emphasised the growing contribution of digital transformation to greenhouse gas emissions and stressed the importance of ensuring sustainable AI development and deployment. They discussed the need for sustainable aspects to be considered in the development and deployment of digital technologies, including AI, and highlighted the role of digital transformation in addressing the planetary limits of AI.

The speakers discussed various options for action to promote the sustainable development of ICT sectors and technologies, with a specific focus on AI. They proposed measures such as the development and adoption of green ICT standards to support governments and stakeholders in developing sustainable and circular ICT systems. Examples were shared to illustrate how these standards could contribute to reducing ecological impacts and fostering sustainable practices.

Another key topic of discussion was the role of civil society and business in promoting sustainable AI. The panelists discussed the specific challenges faced by communities in Africa and Cambodia in adopting and benefiting from AI technologies sustainably. They highlighted the importance of including diverse perspectives and ensuring that the benefits of AI are accessible to all members of society.

Transparency and measurement were also highlighted as crucial factors in achieving sustainable digitalisation. The need to avoid the risk of greenwashing, where companies make false or exaggerated claims about their environmental practices, was emphasised. The discussion emphasised the importance of accurate measurement and reporting frameworks to assess the ecological impact of digital technologies and ensure genuine sustainability efforts.

The forum concluded with closing statements from each of the speakers, summarising the key points raised during the discussion. There was an overall agreement on the significance of integrating sustainability in ICT technologies and global digital governance, particularly in the context of AI. The forum provided a platform for meaningful dialogue and collaboration among stakeholders to drive positive change towards a more sustainable and inclusive digital future.

Noam Kantor

Businesses have a crucial role in sustainable AI by investing in environment-friendly partnerships. This involves seeking out and investing in or partnering with organizations that mitigate the climate emergency. Tech companies should also consider the ethical standpoint of their investments. Making products more efficient and sustainable is another important aspect of sustainability. Mozilla, for example, allows developers using Firefox developer tools to track the carbon emissions of their software. Civil society plays a significant role in educating the public about the climate impacts of technologies like AI. In Africa, sustainable technological development faces challenges such as limited funding and finance. However, initiatives like Mozilla’s Africa Emrati Project aim to address these barriers. Transparency is vital in sustainability, and digital companies should develop a transparent look at their environmental impacts. Tech regulators also have a crucial role in enforcing against deceptive greenwashing claims. Making sustainability part of product development can drive sustainable digitalization. Overall, businesses, civil society, tech regulators, and individuals all have important roles to play in promoting sustainable practices in the digital age.

Atsuko Okuda

The analysis highlights the need for greener AI and ICT development to address their negative impact on the environment. The greenhouse gas emissions generated by top telecom companies were estimated to be 260 million tons of carbon dioxide equivalent in 2021. This calls for urgent action to mitigate the environmental impact of these industries.

However, digital transformation shouldn’t be abandoned; instead, it should take environmental considerations into account. AI can play a crucial role in enhancing green transformation and weather forecasting. For example, AI can improve the predictability of demand and supply for renewable energy across a distributed grid, promoting sustainable energy practices. Additionally, AI can enhance weather forecasting, which has implications for climate action.

Another concerning issue is the significant amount of e-waste generated due to the increase in internet users. It is estimated that over 70 million tons of e-waste will be generated annually by 2023. Efficient e-waste management practices, including recycling to extract critical raw materials and promote a circular economy, are urgently needed.

Standardization and recommendations for environmental performance and e-waste management are crucial to ensure all stakeholders work towards common environmental goals.

Raising awareness among wider societal groups about the environmental impact of AI and ICT is crucial. The International Telecommunication Union (ITU) is implementing an AI project to build capacity and awareness among different stakeholders. This inclusive approach enables diverse perspectives to be considered in finding solutions to environmental challenges.

The ITU is also evaluating the environmental resilience and performance of data centers, aiming to improve their sustainability.

While AI technology offers opportunities, it should be integrated with environmental considerations to minimize negative impacts.

Addressing e-waste management requires collaboration with small and medium-sized enterprises (SMEs). An area office and innovation center in Delhi is working with SMEs and businesses in India to tackle e-waste management challenges.

Policy and regulatory mechanisms play a significant role in addressing the e-waste issue, ensuring producers take responsibility for proper e-waste management, even if they are not located in the same country as end-users.

Furthermore, proper e-waste disposal practices are essential to prevent environmental and ocean pollution.

Digital inclusion and transformation are crucial for global development. However, environmental concerns must be considered alongside these goals. Approximately 2.6 billion people are still unconnected, highlighting the digital divide. Bridging this gap while incorporating environmental considerations is essential.

To summarize, addressing the negative impact of AI and ICT on the environment requires greener development practices. Key areas of concern include greenhouse gas emissions, e-waste generation, and the digital divide. Incorporating environmental considerations into digital transformation, promoting proper e-waste management and recycling, raising awareness, and implementing policy and regulatory mechanisms are vital steps towards a sustainable future.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Net neutrality & Covid-19: trends in LAC and Asia Pacific | IGF 2023

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Audience

During the conversation, Javier begins by expressing gratitude to the person he is speaking to in various languages, such as “gracias” in Spanish and “ciao” in Italian. He then bids farewell using the phrases “nos vemos” and “bye-bye.”

Javier then brings up the topic of drafts, suggesting that he believes the woman he is speaking to has some. However, he appears uncertain about this assumption, repeating the statement “I think she has drafts” to indicate his lack of certainty.

The purpose of discussing this topic seems to be to engage in conversation and explore ideas related to drafts. However, the conversation stalls as the woman repeatedly uses the phrase “Creo que…” to share her thoughts, indicating her own uncertainty or hesitation in expressing a definitive opinion.

These exchanges highlight the tentative nature of their conversation and the absence of concrete information or consensus regarding drafts. It appears that they are both searching for common ground or a clearer understanding of the subject matter.

Overall, this conversation offers insights into the interpersonal dynamics and communication style between Javier and the woman, as well as their shared uncertainty about the existence of drafts and their desire to engage in conversation.

Piero Guasta Leyton

The discussions surrounding net neutrality and non-discrimination in the context of trade are considered to be of utmost importance. Piero, for instance, perceives these discussions as key, particularly when it comes to the trade aspect. However, it is often observed that these subjects tend to be overshadowed by more popular topics.

In terms of protecting internet-related aspects, such as free data flows and net neutrality, it is argued that these aspects should be safeguarded rather than implemented. It is contended that these key principles already exist, and the goal should be to ensure their protection. Trade agreements play a crucial role in achieving this objective, as they should aim to guarantee the preservation of these principles.

Similarly, non-discrimination is highlighted as a principal aim in trade. The notion of providing equal opportunities for all participants and market entrants is key. Notably, during the pandemic, specific measures were not required due to the existence of non-discriminatory regulations. Moreover, the measures taken by countries during the pandemic were generally deemed permissible from a trade perspective.

Moreover, net neutrality policies are attributed with having a positive impact on market competition and consumer choices, particularly in the case of Chile. These policies have facilitated the entry of various technological products into the Chilean market, making it more attractive and competitive.

In summary, the discussions surrounding net neutrality, non-discrimination, and internet-related aspects are seen as critical in the trade domain. Protecting and preserving these principles through trade agreements can help ensure equal opportunities and foster market competitiveness. Furthermore, the positive impact of net neutrality policies on market competition and consumer choices, as evidenced by the Chilean example, highlights the importance of these topics for further discussion and promotion.

Javiera Cáceres Bustamante

Net neutrality is a critical principle for ensuring equal access to the internet and plays a crucial role in achieving the Sustainable Development Goals (SDGs). It prevents discrimination by internet service providers, ensuring that all users have equal access to different sites and applications. By maintaining an open and level playing field, net neutrality fosters equitable opportunities for individuals and businesses.

Net neutrality holds significant potential in contributing to the SDGs, particularly SDG 4 (Quality Education) and SDG 8 (Decent Work and Economic Growth). It can ensure access to online educational resources and platforms, enabling individuals to acquire knowledge and skills necessary for quality education. Additionally, net neutrality can facilitate job creation in digital environments, supporting the goal of achieving decent work and economic growth.

The COVID-19 pandemic further highlighted the importance of net neutrality. While exceptional measures, such as traffic management for emergencies and prioritisation of access to critical digital services, were implemented during the pandemic, they were seen as compatible with the principle of net neutrality. These measures aimed to ensure that essential services and information were accessible to all, emphasising the significance of net neutrality in times of crisis.

The Pacific Alliance, comprising four countries, has made notable progress in implementing net neutrality. It has set a precedent by incorporating this principle into an international treaty, demonstrating a shared commitment to ensuring equal access to the internet. The experiences of the Pacific Alliance can provide valuable insights for other economies, particularly in the Asia-Pacific region, seeking to regulate net neutrality effectively.

Network slicing, a complex and evolving topic, is closely associated with net neutrality. It involves dividing a network into multiple virtual networks to optimise resources and provide tailored services based on application requirements. While some view network slicing as a means to enhance safety and efficiency in services like autonomous driving, it poses challenges in terms of maintaining net neutrality. Therefore, careful regulation is necessary to prevent backdoor violations of net neutrality in the context of network slicing.

Investigating how companies comply with net neutrality is crucial and provides valuable insights for future research. Understanding the extent to which companies adhere to net neutrality principles can inform policymakers and regulators in designing effective strategies and policies to ensure equal access and prevent discriminatory practices in the digital landscape.

In conclusion, net neutrality plays a vital role in ensuring equitable access to the internet and contributes to the achievement of SDGs such as quality education and decent work. Exceptional measures during the COVID-19 pandemic have underscored the compatibility of net neutrality with prioritising critical services. The Pacific Alliance stands as a successful model for incorporating net neutrality into international treaties, while network slicing necessitates careful regulation to avoid violations. Investigating compliance with net neutrality provides valuable insights for future research and policy development in the digital realm.

Dilmar Villena Fernández Baca

The analysis examines the impact of net neutrality on internet usage in Peru during the COVID-19 pandemic. It underscores that the internet infrastructure was unprepared for the surge in information flow caused by the pandemic, resulting in network overload. To address this issue, the Peruvian government allowed operators to prioritize certain data packages through emergency actions. This was done to alleviate the strain on the network caused by increased device usage for work and entertainment during the pandemic.

One argument presented is that the exceptions made by the Peruvian government to net neutrality regulations were necessary to adapt to changes in internet usage patterns. For example, the government developed the ‘Aprendo en Casa’ platform to provide educational materials to students. Telecommunication companies were given the flexibility to prioritize data packages related to remote work and learning. This decision aimed to ensure uninterrupted access to essential services, such as online education, during the pandemic.

However, the analysis also highlights concerns about selective zero-rating in Peru. Zero-rating refers to exempting certain data packages from usage limits or charges. The stance put forward is that Peruvian regulations permit zero-rating as long as it is not done arbitrarily. However, compliance with this regulation varied among telecom companies. Several operators did not fully adhere to transparency guidelines, which require them to be transparent about zero-rating. Only one major operator in Peru was found to be fully compliant during the pandemic. This non-compliance and lack of transparency generated a negative sentiment regarding the implementation of net neutrality regulations in Peru.

The analysis also reveals the impact of net neutrality on non-traditional forms of work, such as gamers and streamers. It argues that prioritizing conventional work-related traffic penalized these workers, as their data flow requirements were not adequately met. This aspect highlights a potential downside of prioritizing certain types of internet traffic during periods of increased network strain.

Furthermore, the analysis extends beyond Peru and highlights compliance with net neutrality among telecommunication companies in the Pacific Alliance. Despite being the same corporations, compliance varied across different countries in the Pacific Alliance. An example mentioned is Intelcom, a Chilean company operating in Peru, not fully complying with net neutrality transparency guidelines. This observation emphasizes the need for consistent implementation of net neutrality regulations across borders.

In conclusion, the analysis provides valuable insights into the challenges of net neutrality during the COVID-19 pandemic in Peru. It reveals the strain on internet infrastructure, the regulatory exceptions made by the Peruvian government, concerns about selective zero-rating, and compliance issues among telecom companies. The analysis emphasizes the importance of maintaining a balance between prioritizing essential services and ensuring equal access to the internet for all users.

Olga Cavalli

Argentina does not have specific regulations on net neutrality, but its national law on digital services indirectly upholds the principles of network neutrality. The law includes two articles that guarantee network neutrality for the services in place, ensuring equal treatment of all online traffic. However, challenges arise regarding the distribution and concentration of internet traffic, particularly on streaming services, which can result in unequal treatment of other online services. Additionally, the practice of zero-rating in mobile services packages, where certain services like WhatsApp are exempted from data charges while others are not, raises concerns about fair treatment. Moreover, the inclusion of IoT devices in mobile networks, such as 5G, raises questions about the feasibility of network neutrality due to the possibility of treating different types of traffic differently for functionality. Some argue that this approach may violate net neutrality, especially when it comes to time-sensitive traffic from IoT devices like autonomous cars. Good regulation is vital to enable services for consumers and service providers, taking into account the rapid changes in the technological environment. It should provide room for future updates and improvements while ensuring fairness for all parties involved. In conclusion, while Argentina indirectly supports network neutrality through its national law on digital services, challenges persist and require careful consideration and regulation to ensure fair and equal access to the internet and foster innovation in the digital services sector.

Raquel Gatto

Net neutrality has emerged as a significant issue in Brazil, necessitating the implementation of regulations to safeguard the rights of internet users. In 2014, Brazil enacted a law that aimed to protect user rights on the internet without subjecting them to criminal charges. This law allowed for the use of the internet as a means to safeguard and uphold these rights.

The Marcos Review, also known as the Brazilian Bill of Rights, was formulated through public consultations and online discussions. This inclusive approach ensured that the opinions and perspectives of a wide range of stakeholders were taken into account. The Marcos Review enshrined net neutrality as a fundamental principle in Brazil’s internet governance framework.

However, the Marcos Review also acknowledges that there can be exceptions to the principle of net neutrality in certain circumstances. For example, it recognizes the need for traffic control and the prioritisation of emergency-essential services. These exceptions are carefully defined and implemented to ensure that they do not undermine the overall principle of net neutrality and the protection of user rights.

The Brazilian Internet community, known as NIC.br, plays a significant role in defining and implementing these exceptions. This organisation works closely with various stakeholders to ensure that the exceptions are justified, transparent, and in the best interest of internet users. By involving the Brazilian Internet community, the regulatory framework surrounding net neutrality becomes more accountable and responsive to the needs and concerns of the public.

Overall, the sentiment surrounding net neutrality in Brazil is neutral. There is a call for cautious monitoring of any exceptions to the principle of net neutrality. This suggests that there is a recognition of the importance of balancing the needs for regulation and protection of user rights, while also maintaining an open and equitable internet environment.

In conclusion, net neutrality is a significant concern in Brazil, and the country has taken significant steps to address it through regulations and the Marcos Review. The law passed in 2014 allows for the protection of user rights without criminalising them, and the Marcos Review ensures that net neutrality is upheld as a principle while also allowing for carefully defined exceptions. By involving the Brazilian Internet community in the process, Brazil’s regulatory framework aims to provide a balanced and accountable approach to net neutrality.

Felipe Muñoz Navia

During the session, the topic of network slicing with 5G and its potential impact on net neutrality laws was discussed in depth. Network slicing, which involves dividing a physical network into multiple virtual networks, allows for the creation of different logical networks on the same hardware. This innovation opens up new possibilities for enhanced mobile broadband, massive machine type communication for Internet of Things (IoT), and ultra-reliable low-latency services.

However, it was acknowledged that network slicing could potentially affect net neutrality at lower levels that may not be covered by existing laws. The speakers emphasised the need for careful analysis and updates to technical drafts that accompany these laws. They proposed that laws should be updated to cover potential violations of net neutrality that may occur beneath the routing, ensuring that the principles of an open and unbiased internet are upheld.

The session concluded that advancements in technology call for laws and technical drafts to be revised and adapted to accommodate these changes. The speakers highlighted the importance of net neutrality in maintaining an internet ecosystem that fosters innovation, competition, and equal access to information. Therefore, thorough evaluation and consideration of network slicing’s implications on net neutrality are necessary to prevent any unintended consequences.

In summary, network slicing with 5G offers various benefits for logical networks, but it also poses challenges to net neutrality at lower levels. Updating laws and technical drafts is vital to uphold net neutrality and safeguard fairness and equality in the digital space. Proper analysis and adjustments are necessary to accommodate technological advancements and maintain the integrity of net neutrality in all aspects of network infrastructure.

Ignacio Sánchez González

Net neutrality is an essential principle that has received substantial attention and regulation in various countries and international treaties. Specifically, the Pacific Alliance, consisting of Chile, Colombia, Peru, and Mexico, has acknowledged the significance of net neutrality by enacting it into their national laws. Furthermore, the Pacific Alliance as an organization has extended the scope of net neutrality by incorporating it into their trade protocol, setting a noteworthy precedent in international public law.

In Brazil, net neutrality is also a major topic of discussion, seen as a crucial element of internet rights and legislation. This highlights the need for comprehensive regulations to ensure proper implementation of net neutrality. Key to this is incorporating exceptions in regulations, as they play a vital role in striking a balance between preserving net neutrality and addressing specific circumstances that may require different treatment.

However, a critical concern is the lack of an active monitoring body that ensures compliance with net neutrality principles. Despite having legislation and dispute settlement mechanisms in place, the absence of continuous monitoring hampers effective implementation. This poses a challenge in ensuring that internet service providers (ISPs) adhere to net neutrality principles and refrain from discriminatory practices.

Additionally, the interaction between net neutrality and network slicing is a relevant aspect to consider. Network slicing is a technique used to accommodate specific technical requirements, such as low latency for critical services like autonomous driving. Whether network slicing complies with net neutrality principles largely depends on the application and intent behind its implementation. This highlights the importance of regulating and monitoring net neutrality and network slicing practices to prevent preferential treatment or discrimination by ISPs.

In summary, net neutrality is a vital principle for maintaining an open and equal internet environment. Its regulation in various countries and international treaties, particularly within the Pacific Alliance, demonstrates the global recognition of its importance. To effectively implement net neutrality, comprehensive regulations should be in place, including exceptions that strike a balance. Moreover, active monitoring mechanisms are necessary to ensure compliance and prevent discriminatory practices. Overall, the regulation and monitoring of net neutrality and network slicing are critical for safeguarding the principles of an open and fair internet.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more