Defence against the DarkWeb Arts: Youth Perspective | IGF 2023 WS #72

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Speaker

The dark web and internet have various purposes beyond criminal activities, making them tools rather than the enemy. Machine learning, AI, improved encryption, blockchain, and advanced data analysis can assist in combating dark web crimes. Focus should be on technology and software companies rather than user identification. Mitigating the abuse of power in the fight against crime involves forming specialized cybercrime agencies and collaborating with academia. Mandatory cybersecurity education is necessary for all involved in handling data. Whistleblowing mechanisms should be encouraged. Law enforcement and politicians often lack understanding of the internet’s working, necessitating increased awareness. Diverse hiring can aid in understanding software misuse. A software registry and due diligence are crucial in identifying and preventing software misuse. These measures contribute to creating a safer online environment.

Maria Lipińska

During the discussion, the potential positive use cases of the dark web were explored, shedding light on how it might impact the future of online privacy and security. The speakers acknowledged the dark web’s negative reputation but emphasised that there are aspects of it that can be harnessed for beneficial purposes.

One of the main points raised was that the dark web enables anonymous communication and the exchange of information. This can be advantageous for individuals living in repressive regimes or facing persecution, allowing them to freely express themselves and access uncensored content. Moreover, whistleblowers and journalists can use the dark web to protect their sources and share sensitive information securely.

Furthermore, the dark web can facilitate the sale of legal goods and services. For example, it serves as a platform for anonymous online marketplaces where individuals can purchase legal products, such as books or art, without leaving a digital trail. The anonymity provided by the dark web can also empower activists and dissidents in countries where their activities might be monitored or suppressed.

In terms of online privacy and security, the dark web can act as a catalyst for innovation. The constant battle between criminals and law enforcement agencies pushes the development of advanced encryption techniques and cybersecurity measures. As a result, lessons learned from tackling the challenges presented by the dark web can be applied to enhance overall online privacy and security.

It is worth noting that the positives discussed should not overshadow the illegal and unethical activities that are prevalent on the dark web. Criminal networks, such as drug trafficking and illegal marketplaces, make up a significant portion of dark web activity. However, it is essential to consider the potential positive aspects and explore how they can be used responsibly.

In conclusion, the potential positive use cases of the dark web were evaluated, highlighting its impact on online privacy and security. While acknowledging its negative reputation, the discussion shed light on the anonymity and freedom of expression it offers individuals living in repressive regimes. Additionally, the dark web’s role in facilitating legal transactions and driving innovation in cybersecurity was recognized. Nonetheless, it is crucial to address the illegal activities on the dark web and ensure that any exploration of its positive side is done responsibly and ethically.

Izaan Khan

The analysis suggests that the dark web can offer benefits to certain individuals by providing anonymisation services. This can be particularly useful for individuals who require a high level of privacy and restricted access to a tightly knit community. Anonymity on the dark web can be critical for use cases such as journalists researching or communicating under extreme conditions, as well as for organising protests. Overall, the sentiment towards the dark web is positive, emphasising its potential advantages.

Furthermore, the analysis acknowledges that law enforcement agencies have achieved successful outcomes in cases involving cybercrimes on the dark web, citing notable examples like Silk Road and AlphaBay. However, it argues that eradicating privacy-enhancing technology, such as the dark web, is not necessary to combat cybercrime effectively. Instead, alternative strategies such as open source intelligence, infiltration, and hacking techniques can be employed to counter cybercrime without compromising privacy rights. The sentiment towards this argument is neutral.

The report also highlights the importance of people’s ability to protect their online privacy using technologies like the dark web. It advocates for a principles-based approach that balances the need for anonymity against other legitimate uses of anonymising technologies. This sentiment is positive, reflecting the belief that individuals should have the right to safeguard their privacy online.

Regarding regulation, the analysis suggests that regulations should be defined within the context of cybercrime. Existing regulations, including basic criminal law, already exist. However, it is noted that enforcement often involves a constant arms race between authorities and cybercriminals. The sentiment towards regulation is neutral, emphasising the need for a careful and nuanced approach.

It is also highlighted that technological solutions alone are inadequate in combating cybercrime. The dynamic nature of cybercrime requires innovative solutions that go beyond technology. Additionally, adopting more pragmatic approaches to regulation, such as controlling information flows and data retention, is seen as potentially beneficial.

The importance of trust in institutions within the complex regulatory environment is emphasised. It is believed that trust is crucial for navigating the challenges posed by emerging technologies and evolving regulatory frameworks.

The analysis further emphasises the significance of international cooperation and capacity building in effectively combating cybercrime. It notes that a lack of understanding of technology can hinder policy outcomes and enforcement efforts. Existing international cooperation organisations, such as Europol and Interpol, are highlighted as essential in the fight against cybercrime.

Additionally, the analysis raises the concern that tension between governments and encryption services will intensify. Governments may seek to undermine encryption for backdoor access, potentially restricting the privacy and security provided by these services. This development is viewed negatively, suggesting potential conflicts between privacy protections and government surveillance.

Furthermore, the report anticipates changes in the landscape of internet usage due to technological advancements and government regulations. It suggests that the emergence of new anonymisation services and government attempts to undermine encryption could reshape the way people use the internet.

In conclusion, the analysis highlights the benefits of the dark web in providing anonymisation services to individuals who require heightened privacy. It emphasises that eradicating privacy-enhancing technology is not necessary to combat cybercrime effectively. Instead, a principles-based approach that balances anonymity and other legitimate uses of technology is advocated. The report also emphasises the need for pragmatic regulation, international cooperation, and trust in institutions to address the challenges posed by evolving technology and cybercrime.

Pedro de Perdigão Lana

The discussion revolves around various aspects of internet governance, the dark web, and intellectual property. One argument highlights the importance of intellectual property in the context of internet governance. It is stated that intellectual property was among the first and most important discussions among civil society, the private sector, and the government in relation to internet governance. However, another argument challenges the dark web’s notorious reputation for intellectual property infringement. It argues that the portrayal of the dark web as a hub for criminal activity, particularly intellectual property crimes, can be misleading. The argument suggests that the dark web and deep web are not exclusively used for illegal activities, but are also repositories for various types of files, including copyrighted content.

Furthermore, the discussion explores the negative consequences of fear-driven policies and rigid copyright systems that have emerged due to concerns about the dark web. It is argued that several society reforms have been implemented based on the idea that piracy, including intellectual property infringement, is a widespread problem. These fear-driven policies may have inadvertently created obstacles to the very objectives they aim to promote.

The need for purposeful and careful regulation of the dark web is emphasized. While acknowledging the potential dangers associated with the dark web, the argument highlights that regulating it should take into account its positive uses, such as communication in environments where freedom of expression is restricted. It is suggested that regulation should be purposeful, avoiding undue restrictions on legitimate uses and considering the underlying reasons for regulation.

Additionally, the discussion examines the ethics and inequalities associated with academic documentation. It is noted that some academic ecosystems are unjust towards poorer countries, and publicly funded scientific publications charge high fees for access. This situation raises questions about the ethics of sharing academic documentation and the role of copyright in academia.

Furthermore, there is criticism directed towards the science publishing industry for charging exorbitant access fees despite being sustained by public funding. The argument highlights that the industry charges thousands of dollars for access to scientific publications, which creates barriers to knowledge dissemination and exacerbates economic inequalities.

In conclusion, the discussion revolves around the complexities and nuances of internet governance, the dark web, and intellectual property. It emphasizes the need for careful consideration when regulating the dark web, taking into account its positive uses. The discussion also raises important questions about the ethics and inequalities associated with academic documentation, as well as the practices of the science publishing industry. By critically examining these issues, it is hoped that a more balanced and effective approach to governance and regulation can be achieved.

Pavel Zoneff

The Tor software is a powerful tool used by millions of individuals worldwide to securely access the internet while protecting their right to privacy and information. It aids users in circumventing censorship and browsing the internet freely without facing restrictions imposed by governments or other entities.

It is important to note that only a small fraction of the traffic on the Tor network is directed to onion services, which are confined exclusively to the Tor network. This suggests that while censorship circumvention is a significant use case for Tor, it is not its sole purpose.

However, there is notable criticism levelled against privacy-preserving technologies such as Tor, Signal, and encryption platforms. Some individuals or entities misinterpret encryption as being associated with nefarious intentions, leading to unjust criticisms of these technologies. This misconception can result in policymakers lacking a comprehensive understanding of how privacy-preserving technology works.

As a consequence, governing laws are sometimes enacted that roll back international standards related to human rights, freedom of expression, and access to information. This situation is concerning, as it indicates a lack of education and awareness among policymakers about the importance of privacy and its relationship to fundamental human rights.

To counter this negative perception, it is crucial for proponents of privacy-preserving technology to engage in robust advocacy efforts. There is a need to raise awareness and educate policymakers about the benefits and importance of these technologies, as well as to dispel any misconceptions or unfounded fears surrounding their usage. By doing so, it may be possible to protect and preserve fundamental human rights in the digital age.

Overall, the Tor software plays a pivotal role in safeguarding internet users’ privacy and right to information. However, the criticism and lack of understanding around privacy-preserving technologies highlight the need for continued efforts to advocate for their importance and counter any unfounded narratives surrounding their usage.

Alina Ustinova

In this series of articles, Alina Ustinova delves into the controversial topic of the ‘dark web’ and aims to shed light on its implications, fears, and potential benefits. Ustinova, as the president of the Centre for Global IT Cooperation and the organiser of the Russian IJF and Youth Russian IJF, is well-positioned to explore this subject and provide valuable insights.

In her exploration, Ustinova acknowledges the widespread misunderstanding around the term ‘dark web’ and its incorrect association with negative activities. She seeks to clarify the misconceptions that people have by differentiating the dark web from the deep web, emphasizing their distinct characteristics. By doing so, she hopes to dispel the misconceptions and provide a clearer understanding of the dark web.

Ustinova also emphasises that the dark web potentially holds benefits beyond its negative connotations. She aims to uncover these potential benefits and challenges the prevailing notion that the dark web is purely a hub of illicit activities. By exploring the possibilities, Ustinova opens the door to a more nuanced understanding of the dark web and its potential uses.

On a different note, research indicates that young people, mainly millennials, exhibit bad habits in cybersecurity. It is observed that many youths are drawn to the dark web out of fascination for forbidden things and as a form of protest against the system. This insight highlights the complex motivations behind young people’s engagement with the dark web, indicating a deeper societal issue that needs to be addressed.

Additionally, the rise of Generation Alpha, growing up in the digital age, has led to their inherent reliance on the internet. Ustinova highlights that Generation Alpha, exposed to internet devices at a young age, considers the internet as a beneficial tool that is essential for various aspects of life. This has significant implications for education and the development of digital literacy skills.

In conclusion, Ustinova’s exploration of the dark web sheds light on its implications, fears, and potential benefits. By clarifying misconceptions and differentiating the dark web from the deep web, she offers a more comprehensive understanding of this often-misunderstood realm of the internet. The insights gained from Ustinova’s analysis also highlight the complex motivations behind young people’s engagement with the dark web and underline the importance of digital literacy skills in the modern age.

Abraham Fiifi Selby

The dark web, a part of the internet accessed through special software, presents a range of risks and benefits for users. It contains websites that are not indexed by traditional search engines, making it a haven for illegal activities such as the sale of drugs, stolen data, and hacking tools. However, it is important to note that not all aspects of the dark web are associated with criminal activity.

One argument suggests that using the dark web can be dangerous for ordinary users, unless used properly. This is due to the specific risks involved, including exposure to malware, scams, and illegal activities. Dark web tools are not encrypted and can be monitored by third parties, potentially compromising user privacy and security. Nevertheless, another viewpoint asserts that the dark web can also be used for legal and meaningful purposes if used correctly. In fact, the dark web is not exclusively for criminal activity and, when utilized wisely, it can actually provide protection for users. It is essential for ordinary users to learn how to navigate the dark web safely in order to avoid these risks and experience the potential benefits it offers.

Regulating the dark web is seen as a complex task for law enforcement agencies. While there is a need to investigate and prosecute organizations that engage in criminal activities on the dark web, developing effective regulations is challenging. The dark web operates on an anonymous network that is difficult to trace, requiring specialized strategies and tools to combat illegal activities. However, governments and law enforcement agencies are taking steps towards regulating the dark web. For instance, the FBI shut down the Silk Road, one of the largest dark web marketplaces, in 2013. In 2020, the UK government announced plans to introduce new legislation aimed at giving enforcement more powers to investigate and prosecute dark web crimes.

Education and awareness are highlighted as key elements in safely utilizing the dark web. As users are often unfamiliar with how to navigate the dark web safely, there is a need to provide education and raise awareness about the risks and best practices. Understanding the nature of the dark web is crucial in order to detect and mitigate potential threats. Creating awareness about the dark web can help users make informed decisions and protect themselves from the dangers associated with it.

Despite its association with criminal activities, the dark web can also be utilized for good purposes. People can leverage the anonymity and privacy provided by the dark web to conduct research and share information about sensitive topics without fear of censorship or surveillance. This highlights the potential for the dark web as a platform for positive contributions to society.

In conclusion, the dark web presents a complex landscape with both risks and benefits. It is important for users to understand the dangers involved and learn how to navigate it safely. Regulating the dark web is a challenging task, but necessary to combat criminal activities. Education and awareness play an important role in safely utilizing the dark web, while also recognizing its potential for positive usage. By promoting responsible usage and implementing effective regulations, society can better harness the potential benefits of the dark web while minimizing its risks.

Audience

The analysis highlights several important points raised by the speakers. One speaker discussed the challenge of identifying cyber crime and used the analogy of a thief breaking into a house to illustrate the complexity involved. The speaker’s sentiment towards this challenge was negative, indicating the difficulty of understanding cyber crime.

Another speaker emphasized the need for consistency in global internet usage and regulation. They stressed the importance of establishing a common ground for internet governance and highlighted the different approaches taken by countries like China and Russia. The speaker’s sentiment towards this topic was positive, suggesting the necessity of a consistent approach.

A concern was expressed for marginalized communities in the context of internet governance. The speaker acknowledged that these communities often lag behind in internet access and usage, potentially exacerbating existing inequalities. The sentiment expressed towards this issue was one of concern, demonstrating an understanding of the potential marginalization.

Furthermore, research findings revealed that millennials tend to have poorer cyber security habits compared to older generations. This observation underscores the need for increased awareness and education on cyber security, particularly targeting younger individuals.

Lastly, there was a discussion on the future landscape of dark web activities, focusing on the perspective of youth. Although specific supporting facts were not provided, the analysis indicates an interest in understanding the potential evolution of dark web activities among young people.

In summary, the analysis provides valuable insights into cyber security, internet regulation, and their impact on marginalized communities. It underscores the challenges in identifying cyber crime, the importance of consistent global internet governance, and the need for improved cyber security habits among younger generations. Additionally, it recognizes concerns for marginalized communities and the urgent need for inclusive and equitable internet governance. The analysis also raises questions about the future landscape of dark web activities, particularly from a youth perspective.

Miloš Jovanović

The internet is a vast space that contains a wealth of resources, some of which are not easily accessible through conventional search engines. These resources are found in the deep web, which is the part of the internet that is unindexed by search engines like Google. The deep web contains content that is not readily available to the general public, making it a mysterious and intriguing realm.

However, there is often confusion between the deep web and the dark web. The dark web is a subset of the deep web, specifically associated with negative and illegal activities. It is a place where individuals can engage in illicit behavior, such as buying weapons or drugs. It is crucial to differentiate between the two and not solely associate them with negativity.

The deep web and the dark web share the common characteristic of housing unindexed resources on the internet. The dark web, however, is just a portion of the overall deep web. It is essential to clarify this distinction to avoid misunderstanding.

While the dark web and the deep web are often viewed as havens of illegal activities, it is crucial to note that illegal behaviors and cybercrime are not exclusive to these parts of the internet. Negative behaviors and cybercrime can occur on publicly available resources like social networks as well. Therefore, it is essential to approach discussions of online security and criminality with a broader perspective that considers the entire internet landscape.

Protecting one’s metadata is also a significant concern for individuals who value privacy and security. Techniques like using the Tor Browser or the onion protocol can help hide metadata, ensuring greater anonymity online.

The responsibility for controlling internet information channels lies with national governments. Geopolitical circumstances have resulted in a fragmentation process on the internet, with different countries seeking control over internet governance. Protecting infrastructure and citizens from cybercrime necessitates traffic control and monitoring.

Investing in technological sovereignty is crucial for nations to have control over their internet space. This involves developing strong agencies and institutions to protect national interests and enacting strict laws regarding data storage and usage. By doing so, countries can ensure they have the means to safeguard their digital infrastructure and maintain control in the ever-evolving technological landscape.

Regulating the dark web or the deep web exclusively is not feasible since they are integral parts of the entire network. Instead, efforts should be focused on regulating the internet as a whole to combat illegal activities effectively.

While technology such as TOR and VPNs can provide some level of data protection, they may not guarantee absolute privacy. It is essential for users to understand the limitations of these technologies and exercise caution when sharing sensitive information online.

Accessing services that are not available in one’s country may violate local laws. It is important for individuals to be aware of and respect the legal frameworks in their respective jurisdictions to avoid engaging in illegal activities.

The fight against cybercrime requires a multi-stakeholder approach, involving collaboration between security and intelligence agencies, governments, and other relevant parties. Current alliances and systems like Europol have made significant contributions but may not be sufficient to effectively combat cybercrime. Enhancing cooperation and communication among different parties is crucial to solving and understanding the complexities of cybercrime cases.

Overall, the deep web and the dark web are intriguing aspects of the internet that warrant further investigation and understanding. While they are often associated with negative and illegal activities, it is important to approach discussions with a balanced perspective that considers the wider internet landscape. By promoting awareness, improving regulation, and fostering international collaboration, we can work towards a safer and more secure online environment.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

DC-Sustainability Data, Access & Transparency: A Trifecta for Sustainable News | IGF 2023

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

David Leslie

The discussion on AI governance focuses on the need for resilient and responsible assistive technologies that prioritize human agency and social relationships. It highlights the importance of adopting a human-centred approach and involving stakeholders in the innovation process. This approach is seen as crucial to ensure that AI technologies align with the values and needs of society.

Resilience, in this context, is viewed as a societal phenomenon that requires a technologically embedded and communicatively rich infrastructure. The co-evolution of society and technology is emphasised, with AI being seen as a tool that is utilised by societal stakeholders. It rejects the notion of technological determinism and emphasises the importance of considering the social impact of AI technologies.

However, concerns are raised about the potential drawbacks of data-driven systems. It is argued that if biases, discrimination, and prejudice are not mitigated, data-driven systems will reproduce and reinforce existing patterns of inequality and prejudice. The impact of data-driven systems on social and demographic data is particularly emphasised, highlighting the challenges of processing such data without perpetuating biases.

Another point of contention is the role of human creativity and innovation in shaping agency. It is argued that data-driven systems do not have the ability to create new worlds in the same way that human beings do. Human agency is driven by our creative capacity and our ability to imagine and create things that did not previously exist.

The role of AI as critical infrastructure is acknowledged, with an increasing reliance on AI in sectors such as energy systems management. However, there is a concern about control over AI infrastructure lying predominantly in the hands of large tech companies. This raises questions about the public interest and social good being served by AI technologies, as private interests may prioritise profit over public welfare.

The need to regain control over AI technologies for the public interest and social good is emphasised. It is argued that the control of AI infrastructure by private firms may not necessarily serve the broader public interest. This is considered one of the central problems of our generation when it comes to technology.

In terms of governance, global collaboration and inclusivity are seen as crucial. The current generative AI moment is described as a commercialisation revolution, which has raised several issues that are now being addressed at a global level. The importance of thinking globally and inclusively about AI governance is underscored.

It is suggested that AI governance should be approached from the perspective of global public interest, rather than relying solely on voluntary agreements by tech companies. Comparisons are made with governance structures for nuclear energy and climate change, highlighting the need for multilateral international bodies to govern consequential science and innovation. The concept of a CERN (European Organization for Nuclear Research) for responsible AI is mentioned to address the challenges of AI governance.

In conclusion, the discussion on AI governance highlights the need for resilient and responsible AI technologies that prioritize human agency and social relationships. It emphasises the importance of involving stakeholders and adopting a human-centred approach in the innovation process. Concerns are raised about the potential biases and discrimination in data-driven systems, and the need to foster human creativity and innovation. The role of AI as critical infrastructure and the control of AI technologies by private firms are also points of contention. The importance of global collaboration, inclusivity, and a perspective of global public interest in AI governance is emphasised.

Arisa Ema

The discussion on AI governance emphasises the importance of various principles such as privacy, fairness, and accountability. These principles serve as a foundation for the responsible implementation and use of artificial intelligence. It is acknowledged that AI governance should consider the ethical implications and potential risks associated with AI technologies. The need for technology to aid in disaster recovery is also highlighted, showcasing the potential of AI to restore and support affected areas during crises.

Agile governance is put forward as an approach to enhance resilience in the face of crisis. This concept suggests that actors involved in governance need to be flexible and adaptable while adhering to established principles and rules. By adopting an agile approach, it becomes possible to effectively deal with situations where outcomes are difficult to predict.

However, caution is raised about the challenges of overdependence on technology. It is argued that relying too heavily on technology can increase vulnerability during crises. Unexpected situations can become difficult to manage if there is excessive reliance on technology. Therefore, striking a balance between technology and human interaction is deemed necessary to ensure a coexistence that considers the limitations of technological convenience.

The rapid growth of AI gives rise to concerns about control, particularly in the context of critical infrastructure. It is stated that AI can emerge in any domain of human experience, and as society becomes more connected, reliance on AI technologies also increases. The fact that large tech companies currently control key AI infrastructures raises concerns about a potential disconnect between private interests and the functioning of AI as a public utility.

The issue of responsibility and costs in AI governance is deemed significant. Creating multiple layers of resilience comes at a significant cost. It is emphasised that the control of AI infrastructure should not be the responsibility of one company or organization alone. Instead, governmental and possibly global dialogue is required to address the shared responsibilities and costs associated with AI governance.

Furthermore, the importance of addressing AI governance not only at the governmental level but also at the international level is highlighted. The existence of international bodies such as the Global Partnership on AI and the Partnership on AI demonstrates the recognition of the need for global collaboration in addressing AI governance. The UK’s organisation of an AI Safety Summit and Japan’s creation of the Hiroshima AI process further exemplify the commitment to international cooperation on AI governance.

Arisa Ema advocates for an inclusive, multi-stakeholder approach to tackling AI governance issues. She believes that all issues should be discussed collectively rather than separately to ensure a comprehensive and inclusive dialogue. This approach encourages the involvement of various stakeholders, including the Orihime pilots, in the discussion on AI governance. This inclusive approach aligns with the broader goals of achieving peace, justice, and reduced inequalities.

In conclusion, the discussion on AI governance highlights the importance of principles, the need for technology in disaster recovery, the adoption of agile governance, challenges of technological dependence, the balance between technology and human interaction, concerns about control and critical infrastructure, the global discussion on responsibility and costs, and the significance of addressing AI governance internationally. The inclusive, multi-stakeholder approach advocated by Arisa Ema further underscores the need for a comprehensive and inclusive dialogue to navigate the complex landscape of AI governance.

Audience

During the discussion, the speakers focused on several key topics relating to technology, inclusion, and sustainability. One important topic addressed was the use of technology to promote greater inclusion and accessibility in society. The speakers emphasised that emerging technologies have the potential to be valuable tools in achieving this goal. They argued that technology should be harnessed to enable people of all abilities to fully participate in society by providing equal access to information, services, and opportunities. This perspective was supported by the fact that technology has the ability to bridge gaps and create more inclusive environments.

Another topic discussed was the need for a more holistic approach to resilience solutions. The speakers highlighted the importance of offering optional solutions that provide individuals with more choice and agency. By considering diverse perspectives and accommodating individual needs, resilience solutions can become more effective and sustainable. This argument was reinforced by the evidence that a one-size-fits-all approach to resilience may not adequately address the varied challenges faced by different communities and individuals.

The need for more comprehensive impact assessments was also highlighted during the discussion. The speakers pointed out that existing impact assessments often focus solely on technical, ethical, or human rights aspects, which may overlook other dimensions of sustainability. To ensure more viable and sustainable solutions, the speakers argued for the adoption of holistic impact assessments. These assessments should take into consideration a wide range of factors, including environmental, social, economic, and cultural dimensions. By incorporating a broader perspective, decision-makers can make more informed choices that align with the principles of sustainability and promote long-term well-being.

Another important point emphasised by the speakers was the potential risk of forgetting core skillsets due to the increasing reliance on technology. They warned against taking for granted the support provided by AI systems and other technologies. The speakers urged individuals and society as a whole to maintain and nurture their core skillsets to prevent dependence on technology from eroding essential capabilities. This neutral argument reminded the audience of the value of fundamental skills such as critical thinking, problem-solving, and creativity in a rapidly changing technological landscape.

Additionally, the speakers discussed the potential view of AI as part of critical infrastructure. They highlighted an audience member’s insightful comment and question on this topic. This perspective suggests that AI, with its increasing presence and impact, should be considered a vital part of critical infrastructure. This view implies that the integration of AI systems into critical infrastructure planning and management is necessary for maximising efficiency and resilience, particularly in areas such as industry, innovation, infrastructure, and climate action.

In conclusion, the discussions held by the speakers underscored the importance of technology, inclusion, and sustainability. By harnessing emerging technologies for inclusion and accessibility, adopting a holistic approach to resilience solutions, conducting comprehensive impact assessments, and maintaining core skillsets, societies can work towards more viable and sustainable solutions. Furthermore, considering AI as part of critical infrastructure can potentially enhance efficiency and resilience in various sectors. These insights shed light on the multifaceted challenges and opportunities we face in achieving a more inclusive, resilient, and sustainable future.

Inma Martinez

Inma Martinez is an expert in technology and artificial intelligence (AI) who advocates strongly for a human-centric approach to AI development. She believes that AI should prioritise meeting human needs and improving people’s lives. Martinez emphasises the importance of values, common sense, and mindset in addressing challenges that arise from the use of AI. While AI can provide comfort and convenience, Martinez highlights that it is ultimately human values and cultural teachings that enable individuals to navigate significant hurdles.

Martinez points out that resilience is a cultural value that can be learned from family and school. She draws on her experience of living in Scandinavia, where individuals are taught survival skills in nature, contributing to their empowerment and resilience. Additionally, building infrastructure with self-healing mechanisms is crucial to ensuring the stability of AI systems. Telecom sectors, for example, include multiple fallback plans, enabling nodes to shift in case of breakdown. Martinez suggests that AI services should have similar resilience built into their design.

In disaster response and recovery, Martinez stresses the importance of providing tools and information at the community or family level to foster resilience. During the Fukushima disaster, personal Geiger counters were distributed to families to effectively monitor radiation levels. Martinez notes that positioning these devices at the level of pets and children, where radioactivity tends to be heavier, proved highly effective.

However, Martinez emphasises the importance of developing AI in a safe and responsible manner. She raises concerns about companies that have released AI systems in unsafe ways, highlighting the need for proper training, testing, and commercialisation to ensure the safety of AI for human use. She believes that AI should be carefully developed and regulated to protect individuals and society as a whole.

Martinez also highlights the power of public awareness and demand in shaping the use and regulation of AI. She believes that collective action is more impactful than government regulation and underscores the need for individuals to demand what they believe they deserve in terms of AI safety and ethics.

Finally, Martinez advocates for collaboration between governments and the people in creating solutions. She highlights that governments should listen to the needs and requests of the public to ensure the development of AI aligns with societal expectations and values.

In conclusion, Inma Martinez argues that AI should be human-centric, with a focus on meeting human needs and improving lives. She emphasises the importance of values, common sense, and mindset in navigating challenges associated with AI. Resilience, learned from cultural teachings, is also crucial. Building AI systems with self-healing mechanisms and providing tools and information at the community level fosters resilience in disaster response and recovery. However, she underlines the need for safe and responsible development, testing, and commercialisation of AI, as well as public awareness and demand to shape its use and regulation. Collaboration between governments and the public is seen as key to creating solutions that align with societal expectations.

Rebecca Finley

The analysis features speakers discussing various aspects of AI development and deployment, with a focus on inclusivity, economic inclusion, safety, monitoring, and responsibility. They emphasize the importance of designing AI systems in an inclusive way to avoid negative impacts on communities. The Partnership on AI, a global non-profit organisation, is mentioned for its focus on developing and deploying AI that prioritises people and society. The speakers note that AI systems have had negative effects on communities when not deployed inclusively.

Regarding economic inclusion, the speakers argue that workers’ perspectives should be at the centre of AI-driven economic inclusion. They highlight that while AI systems provide economic opportunities, they may also be fragile and non-resilient. The argument is made that what might be seen as augmentations for some individuals could be perceived as automations for others, emphasising the need for a balanced approach.

The topic of AI safety and resilience is also discussed. The emergence of large-scale AI models has brought attention to the question of AI safety. Ensuring the safety of AI systems is crucial, particularly as they interact with various other systems of infrastructure. There is a recognition that safety and responsibility are key considerations in managing and ensuring the resilience of emerging technologies, including AI. Collaboration among industry, civil society, and academia is noted as pivotal in understanding the management and safety of AI.

The speakers stress the significance of post-deployment monitoring of AI systems. They suggest that monitoring can reveal the differential impact these systems may have on various communities. It is highlighted that not enough attention has been given to the impacts and safety of deployed AI systems.

The analysis also highlights the challenges associated with the complexity of AI. With AI being a critical system, it is noted that it has many different meanings and applications, which may lead to potential confusion. The importance of system mapping and understanding implications is emphasised to better comprehend how AI interacts within a system.

Mapping the AI ecosystem and determining points of intervention is seen as key to understanding the role and significance of AI. By focusing on model providers due to their outsized impact, scholars and researchers have aimed to identify areas for regulation and intervention.

While regulation for AI is crucial, the speakers argue that measures around responsibility and safety should be implemented in the meantime. They appreciate the need for regulation but advocate for interim measures to ensure that AI technology remains accountable and protective of societies.

Interestingly, the analysis highlights the collaborative efforts of civil society and stakeholders in defining what constitutes “good” in the context of AI. The speakers note a moment of convergence, where multiple stakeholders are coming together to establish standards and guidelines for AI, ensuring its responsible and inclusive development.

The potential of AI technology for greater inclusion and opportunities across different sectors is acknowledged. Generative AI is mentioned as a driver of greater inclusion in some workplaces, highlighting its positive impact.

Lastly, there is an emphasis on making AI technology accountable to humans. The importance of ensuring technology is responsible and protective of societies is stressed, aligning with the goal of promoting peace, justice, and strong institutions.

Overall, the analysis provides comprehensive insight into various dimensions of AI, urging for its inclusive development, economic inclusivity, safety, monitoring, responsibility, and accountability. The collaboration among different stakeholders and the drive to establish guiding principles for ethically and responsibly using AI are noteworthy takeaways from the analysis.

ayako kitano

The analysis focuses on the increasing influence of Artificial Intelligence (AI) and stresses the crucial need for its responsible use. It suggests that AI has the potential to achieve groundbreaking discoveries on par with Nobel Prize-level accomplishments. Mr. Kitano, the source of this claim, highlights that AI is not merely a tool but possesses the capability for high-level autonomy. In other words, AI can make discoveries that are of exceptional quality or even surpass those acknowledged by Nobel Prizes.

Furthermore, the analysis highlights the potential of AI to fast-track solutions for challenges that are currently considered unsolvable. By leveraging the power of AI, problems that elude human comprehension and current methods of solving can be mitigated more effectively. This exemplifies the vast potential and impact of AI in addressing grand challenges across various fields of scientific discovery.

However, a cautious approach is necessary in the context of natural disasters. The analysis argues that over-reliance on AI during such events can have catastrophic consequences. It underscores the vulnerability of AI systems in the face of major calamities, such as earthquakes. If a substantial earthquake occurs, causing power and server disruptions, the reliability of AI for survival during and after the disaster becomes precarious. Professor Kamata at Kyoto University supports this perspective, highlighting that AI relies on stable power supply, telecommunications, and functioning devices like PCs or mobile phones to operate optimally. These assumptions would be swiftly dispelled in the aftermath of a significant earthquake, rendering AI partially or entirely useless.

Consequently, the analysis asserts the necessity to prepare for major catastrophic events. It supports Professor Kamata’s prediction that a catastrophic earthquake is likely to occur around 2035, with some room for variance. The analysis stresses the importance of recognizing that AI requires the availability of stable power supply and telecommunication infrastructure to be fully functional and effective. Consequently, neglecting to consider this factor and overly relying on AI during natural disasters can have detrimental consequences.

In conclusion, the analysis showcases the increasing influence of AI and the critical need for its responsible use. It highlights the potential of AI to contribute to groundbreaking discoveries equivalent to Nobel Prize-level achievements and to fast-track solutions for grand challenges. Furthermore, it warns about the potential calamities that over-reliance on AI during natural disasters can pose, emphasizing the requirement for comprehensive preparation for major catastrophic events. Overall, this analysis provides a nuanced perspective on AI’s role in society and the considerations essential to harness its potential effectively while avoiding potential pitfalls.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

DC-CIV Evolving Regulation and its impact on Core Internet Values | IGF 2023

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Sébastien Bachollet

The internet, a network of networks, is a global medium that operates on open protocols such as TCP, IP, and BGP. It is free from centralized control and promotes open and interoperable communication worldwide. This highlights the positive aspect of the internet, emphasizing its ability to connect people and facilitate the exchange of information.

However, financial challenges are impacting internet freedom. As the world economy struggles to recover, what was previously offered for free on the internet may no longer make financial sense for companies providing services. This negative aspect raises concerns about potential limitations and restrictions that may arise due to economic constraints.

In response to these challenges, governments are actively involved in drafting and implementing regulations concerning internet governance. Notable examples include the UK’s online safety bills, the Australian Online Safety Act, the European Digital Services Act, Digital Market Act, and the US Kids Online Safety Act. This neutral argument suggests that governments are taking steps to ensure the safety, security, and responsible use of the internet.

Amidst these discussions, defenders of the core values of the internet emphasize the importance of preserving certain principles. The Dynamic Coalition on Co-Internet Value promotes permissionless innovation, which allows for the unrestricted development and deployment of new technologies and services. This is seen as a positive stance that supports the notion of an open and innovative internet.

Overall, the analysis illustrates the complex nature of the internet and its evolving landscape. While the internet offers open and interoperable communication, financial challenges pose a threat to internet freedom. Governments are actively intervening through regulatory measures, and defenders of internet values highlight the importance of preserving the core principles that have contributed to its success. The promotion of permissionless innovation adds another layer to the discussion, highlighting the need for ongoing innovation and development in the digital realm.

Audience

The provided summary examines various arguments and viewpoints concerning the security, reliability, and anonymity of the internet. It highlights the increasing dependence on the internet and the rising number of security breaches, emphasising the need to enhance its security and reliability.

On the other hand, the summary acknowledges the struggle with the need for identification on the internet. While identification is necessary for certain purposes, the concept of anonymity is also seen as significant. It argues that anonymity should be considered a fundamental value of the internet and advocates for the development of a standard that can combine both security and anonymity.

Furthermore, the summary supports the creation of a trusted service that promotes secure anonymity on the internet. The benefits of such a service are not explicitly stated; however, it can be inferred that it would provide a secure platform for users to maintain their privacy online.

The summary also brings attention to the concept of communications metadata security, suggesting that it may be a more accurate term than anonymity. It explains that the term “anonymity” can be misleading and proposes that the focus should be on protecting the security of communications metadata.

In addition, the summary mentions the use of Tor for accessing services like Facebook, highlighting the advantages it offers. It allows users to have control over the level of communication metadata they reveal, ensuring their privacy and security online.

Furthermore, it discusses the network layer of the internet, emphasising that identification is not automatically performed at this level. This suggests that users have the ability to choose whether or not to disclose their identity.

The summary concludes by suggesting that it might be beneficial, both in a societal and platform context, to have the option of identifying oneself at a different layer of the internet. This implies that users should have the flexibility to choose when and how they reveal their identity online.

Overall, the extended summary provides a comprehensive overview of the arguments and viewpoints regarding internet security, reliability, and anonymity. It touches on the perspectives of enhanced security, the need for anonymity, the concept of communications metadata security, and the importance of user control over identification.

Lee Rainie

The analysis highlights the issue of internet fragmentation and its impact on various aspects of society. One significant finding is that a staggering 2.6 billion people currently lack access to and use of the internet. This statistic emphasizes the importance of addressing the digital divide and ensuring equal access to the internet for all individuals.

The impact of the internet is further explored through four major revolutions: home broadband, mobile connectivity, social media, and artificial intelligence. Home broadband revolutionised the internet by making it an essential utility in people’s lives. Mobile connectivity then increased the speed of information access and communication. Social media expanded social networks, connecting people globally. Lastly, the emergence of artificial intelligence brought both promising possibilities and fears.

However, it is important to acknowledge that these internet revolutions have also led to social, cultural, and legal fragmentation. Different experiences have emerged across various segments of society, including differences based on class, gender, age, race, ethnicity, religious affiliation, awareness, optimism, and individual behaviours. These disparities highlight the need to address inequalities and ensure that the benefits of the internet are accessible to everyone.

Another significant finding suggests that individuals often perceive themselves as managing the internet better than society as a whole. This perception may stem from personal proficiency or satisfaction with their own internet usage. However, this self-perception does not necessarily align with the overall societal impact of the internet, which may still face challenges and inequalities.

In terms of technology policy, the analysis reveals a growing trend towards partisanship. Previously, there may have been a consensus on issues like anonymity, but that consensus seems to be diminishing. Signs of polarization are evident in the dynamics of populist mainstream parties in Europe. This partisan shift in tech policy raises concerns about the ability to reach effective and inclusive regulations and policies.

The analysis concludes by suggesting that the current dynamic in tech policy is fluid and unsettled. Discussions surrounding technology and its regulation suggest an environment where things are constantly evolving and difficult to settle. This observation underscores the complexity and challenges in shaping a cohesive and inclusive tech policy framework.

Overall, the analysis highlights the need to address internet fragmentation, overcome inequalities caused by the different experiences of internet revolutions, and find ways to address partisan tensions in tech policy. By tackling these challenges, policymakers and society can work towards a more equal, inclusive, and beneficial internet ecosystem for all.

Alejandro Pisanty

Regulation proposals in the context of the internet have raised concerns regarding their potential infringement on the core values of the internet. It is believed that these regulations may have a negative impact on the technical principles with which the internet was built. This concern stems from the assumption that such core internet values are primarily rooted in these technical principles. The sentiment towards these regulation proposals is generally negative, highlighting the need to carefully consider their potential consequences.

One of the main concerns regarding regulation proposals is the potential reduction in the universality of the internet’s reach. There is a risk that these regulations may limit the accessibility and availability of the internet, thereby undermining its global reach. Additionally, it is argued that these regulations may also lead to a reduction in interoperability, making it more difficult for different systems and platforms to effectively communicate with one another.

In order to enhance security, there is a suggestion that additional devices might be necessary for stronger authentication or identification. This highlights the need for ongoing technological advancements to address the evolving challenges of cybersecurity and digital identity verification.

However, it is crucial to implement regulations carefully in order to strike a balance between enforcement and the preservation of core internet values. The focus should be on finding a middle ground that allows for the regulation of the internet while ensuring that the underlying principles that shaped its development are not compromised. This approach is considered constructive, as it acknowledges the importance of regulations while also emphasizing the need to safeguard the fundamental values that the internet was built upon.

The topic of trust establishment in the internet also arises, with questions raised about the magnitude of architectural changes that may be required. There are concerns about the scalability of trust systems and whether they can effectively meet the demands of a growing global network. Alejandro Pisanty specifically highlights Estonia’s trust system as a brilliant example but potentially limited in its scalability. This insight offers valuable considerations for future developments in trust establishment within the internet infrastructure.

Furthermore, discussions around internet governance touch upon the significance of privacy and online identity. It is argued that individuals should have the choice to identify themselves online without being compelled to disclose personal identification data. This highlights the importance of striking a balance between privacy protection and the necessary security measures in place.

The case of AFRINIC, a regional internet registry, brings attention to the challenges faced by private entities registered in certain jurisdictions. AFRINIC’s position as a private entity registered in Mauritius has resulted in numerous court cases, sparking discussions about according technical organizations governing the internet the status of internet government organizations. This observation raises important questions about the governance structure and legal frameworks surrounding the internet.

In conclusion, regulation proposals for the internet have generated concerns about potential infringements on the core values and principles of the internet. Discussions revolve around the need to carefully implement regulations to preserve the internet’s universality, interoperability, and core values. The importance of stronger authentication and identification is highlighted, but considerations must be made for the impact on privacy and choice. Trust establishment also comes under scrutiny, with reflections on scalability and architectural changes. The legal status of technical organizations governing the internet is explored, emphasizing the need for effective governance structures in addressing the complexities of the digital age.

Iria Puyosa

The analysis considers various perspectives in the debate on content moderation in encrypted apps and the transnational flow of data. It raises concerns about ill-designed regulation that could potentially disrupt the internet. The argument is that rushed regulation may have unintended consequences and negative effects. This highlights the need for careful planning and comprehensive consideration.

Another important point raised is the focus on harmful content within encrypted message apps. While much of the public conversation revolves around managing harmful content in these apps, research shows that the majority of content in messaging apps is actually useful and positive. This challenges the notion that harmful content is pervasive and questions the urgency of regulation.

Furthermore, the analysis presents an argument against breaking encryption solely for content moderation purposes. It suggests that there are alternative ways to address harmful content without compromising encryption. Breaking encryption in messaging apps could have broader implications and potentially undermine encryption on the internet as a whole. This negative sentiment emphasizes the importance of considering long-term effects on digital security and privacy.

The analysis also emphasizes the significance of considering the transnational flow of data in policy making. Regulations implemented in one country can significantly impact other countries. The extraterritorial nature of data flow is often overlooked in policy discussions. This neutral sentiment highlights the need for a global approach and collaborative efforts to ensure coherent and harmonized regulations that do not have unintended negative consequences on cross-border data flow.

Additionally, the analysis highlights the importance of respecting human rights, the rule of law, and internet integrity. It suggests that solutions should be found that align with these principles. Balancing concerns while maintaining the core principles of the internet is crucial.

The analysis recognizes the need for technical expertise in policy discussions. It emphasizes the importance of individuals with the knowledge and skills to solve problems and implement effective solutions. This observation underscores the intersection of technology and policy and the value of diverse expertise in shaping regulations.

To prevent unintended consequences, the analysis stresses the necessity of input from civil society and a thorough understanding of human rights before implementing regulations. Involving a broad range of voices and perspectives can help avoid exacerbating existing problems or creating new ones.

In conclusion, the analysis highlights the complexities and various perspectives within the content moderation debate in encrypted apps and the transnational flow of data. It underscores the need for well-designed and thoroughly considered regulations that do not compromise internet integrity or undermine encryption. Respecting human rights, the rule of law, and involving technical expertise and civil society in policy discussions are also crucial. A balanced approach is needed to address concerns while upholding the principles and integrity of the internet.

Nii Quaynor

The African Network Information Centre (afriNIC) has faced significant challenges in Mauritius due to local legislation. These challenges have affected afriNIC’s ability to develop effective policies and have caused issues with Resource Registry (RR) transfer policies. This legislative impact has had a negative effect on afriNIC.

Despite these challenges, afriNIC’s multi-stakeholder approach within the Policy Development Process (PDP) has remained resilient. Draft proposals aimed at hijacking resources have failed to reach consensus, demonstrating the effectiveness of the multi-stakeholder approach in preventing such attempts. Although participation in the PDP has been hindered, leading to the recall of a co-chair, the multi-stakeholder approach has overall been positive for afriNIC.

One argument put forth is that internet identifiers should be managed as public goods, rather than treated as property. Transfer policies in other regions have considered resources as property, but not necessarily for the end user. It is argued that managing internet identifiers as public goods is crucial for their equitable distribution and accessibility.

afriNIC has also faced challenges regarding non-compliance from a member. This member, who had received significant resources but refused to comply with afriNIC’s requirements, had their resources recalled as a consequence. This non-compliance has created further difficulties for afriNIC.

Another concern is the need for stronger protections and governance for afriNIC. Despite plans to become a decentralized organization, this transition remains incomplete. Additionally, afriNIC’s attempts to seek diplomatic protection have not been successful. These factors highlight the need for improved security measures and governance within afriNIC.

Commercial disputes between non-profit organizations and members have also arisen as a challenge. It has been observed that disputes can occur, raising questions about the effectiveness of the current legal system in resolving such issues.

Furthermore, disapproval has been expressed towards a member who refuses to be disciplined and has abused the legal system by generating multiple court cases. This member has violated rules and even attempted to bribe individuals, undermining the integrity of afriNIC and placing further strain on the legal system.

Lastly, concerns have been raised about business misuse and the potential hijacking of numbers by organizations lacking proper infrastructure. Some organizations have been found to be misusing resources and generating numerous court cases without the necessary business infrastructure. This raises ethical concerns and questions about the proper allocation of resources.

In conclusion, afriNIC has faced various challenges, including legislative barriers, non-compliance from members, commercial disputes, and concerns over business misuse and number hijacking. Despite these challenges, afriNIC’s multi-stakeholder approach has shown resilience in the Policy Development Process. However, there is a need for stronger protections, improved governance, and a more efficient legal system to effectively address these issues.

Vint Cerf

The analysis covers a wide range of topics related to internet security, privacy, anonymity, accountability, and the role of technology in filtering harmful internet behaviour.

One area of discussion is the side effects of internet security measures. While governments have enacted laws to protect internet users, there is concern that these laws can be used to inhibit freedom of speech. It is argued that internet security measures have unexpected consequences and may not always achieve the desired outcomes.

The importance of strong authentication is emphasised as a means of preventing unauthorised actions and impersonation. Strong authentication, such as end-to-end cryptography, is seen as a way to protect user information and maintain confidentiality.

Anonymity on the internet is also addressed, with some arguing that it can lead to harmful behaviour. Anonymity is believed to shield individuals engaging in bad behaviour and decrease the consequences for their actions, thereby encouraging harmful actions. However, others argue that mechanisms allowing for identity discovery should be tolerated, as accountability can help prevent harmful actions. The tension between anonymity and accountability is a significant consideration in this debate.

The limitations of technology, such as machine learning, in filtering harmful internet behaviour are highlighted. It is argued that technology fails to effectively filter harmful behaviour and that incorrect filtering can infringe upon individuals’ rights.

Certain situations, such as whistleblowing, are seen as necessitating anonymity. Whistleblowers rely on anonymity to protect their identity and ensure their safety, especially when exposing sensitive information.

The need for architectural changes to internet identity is also discussed. The current identifier provided by the internet, the IP address, is seen as insufficient for maintaining security and privacy. Estonia’s implementation of strong authentication for its entire population is cited as an example of the potential for significant changes to internet identity.

The importance of accountability over absolute anonymity is emphasised, acknowledging the potential risks associated with identifying individuals by biological metrics. Privacy concerns are balanced against the need for accountability to prevent harmful actions.

Vint Cerf, a prominent figure in the field, argues that absolute anonymity may no longer be a core value that serves the interests of internet users. He also supports the inclusion of a multi-stakeholder perspective in policy formulation, believing it should be a normal practice for governments. The multi-stakeholder model of organisations like the Internet Governance Forum (IGF) is praised for ensuring robust policy-making regulations and engagement with governments.

The value of cryptography in data protection is highlighted, with examples of Google’s encryption practices and user-controlled data keys. However, arguments against the idea that data about citizens should be kept within national borders are presented. Keeping data within physical borders is seen as compromising reliability due to the lack of redundancy, while transborder data flows combined with encryption are seen as offering safe data storage options.

The layering mechanism for communications metadata security is appreciated, drawing parallels with other elements of internet design such as the domain name system. The concept of user-choice in revealing identity is viewed positively and considered an important aspect of internet security.

The power of internet exchange points for connectivity is acknowledged, facilitating efficient connections between networks. However, concerns are raised about government-operated exchange points leading to unwanted surveillance if all traffic is required to go through them. It is suggested that cryptography could help secure encrypted traffic running through exchange points.

Furthermore, the challenges of maintaining exchange points and data centres in space are noted, due to the difficulties in accessing these locations and carrying out necessary maintenance.

Lastly, the critical importance of the internet in everyday life is recognised, with global surveys indicating a widespread unwillingness to give it up. The positive impact of the internet on various aspects of society is acknowledged.

In conclusion, the analysis explores complex and diverse perspectives on internet security and related issues. It highlights the need for a balance between security, privacy, anonymity, and accountability. The role of technology in filtering harmful behaviour is examined, and the importance of strong authentication and architectural changes to internet identity is emphasised. The multi-stakeholder approach in policy-making, the value of cryptography in data protection, and the challenges and benefits of internet exchange points and space-based infrastructure are also discussed. Overall, the analysis sheds light on the multifaceted nature of internet security and the ongoing discussions surrounding its various dimensions.

Deborah Allen Rogers

The extended summary discusses the effective e-governance models developed by Finland and Estonia. According to Deborah Allen Rogers, who works with the digital fluency lab Find Out Why, these solutions often go unnoticed. She suggests that promoting learning from and collaborating with Finland and Estonia on their e-governance models is important, as they have been implementing them for about 20 years and have answers to many challenges faced by Europe and the United States in e-governance.

The summary also highlights the crucial role of cryptography in protecting human rights, personal rights, and privacy. It is considered a safe and scalable method for safeguarding information.

Furthermore, the significance of scale in technology is emphasized. Deborah Allen Rogers points out that smaller societies can serve as test samples, and scaling their functional aspects has been successful. The CEO of XRoad, based in Finland, shares insights about their more conservative cultural context in scaling technology compared to Estonia. The summary also mentions that scale changes the concept of what can be done at the push of a button.

It is worth noting that Deborah Allen Rogers has previous experience with drastic transitions, having been a clothing designer during the shift of global manufacturing to China and during the AIDS pandemic, as well as being in New York during the 9/11 attacks. This experience adds credibility to her perspectives.

The functionality of societies is discussed, with Deborah pointing out the difference between highly governed and functional societies, like the Netherlands, and dysfunctional ones. The summary implies that dysfunctional societies may struggle in handling societal aspects effectively.

Finally, the summary emphasizes that the functionality of a society is more important than its size. This notion aligns with the SDGs of reducing inequalities and promoting sustainable cities and communities.

Overall, the extended summary provides a comprehensive overview of the main points, arguments, and evidence discussed in the original text. It also includes Deborah Allen Rogers’ insights and experiences, adding depth to the analysis.

Shiva

Internet exchange points (IXPs) are critical infrastructure that facilitate the exchange of internet traffic between different networks. However, there are concerns about the potential impact of IXPs operating on a commercial business model on internet neutrality. Some IXPs operate as for-profit entities, and this could potentially lead to favouritism or discriminatory practices, impacting the principle of net neutrality.

The argument against commercial IXPs is rooted in the belief that when financial interests are prioritized, the impartial exchange of internet traffic may be compromised. This sentiment is reflected in the negative sentiment associated with this argument. The supporting facts suggest that some IXPs do indeed operate on a commercial basis, which raises concerns about the potential erosion of internet neutrality.

Another concern related to IXPs is government regulation. There is a fear that governments could use their regulatory powers to manipulate or control the internet through IXPs. This negative sentiment draws attention to the potential misuse of IXPs as tools for political censorship or surveillance. The related sustainable development goal of SDG 16: Peace, Justice and Strong Institutions highlights the importance of preserving a free and open internet.

On a more neutral note, there are ongoing discussions and considerations for the design of interplanetary internet exchange points. Given the increasing interest in space exploration and the possibility of future interplanetary communication networks, the concept of interplanetary IXPs is being explored. However, limited information is provided regarding this topic, suggesting that more research and development is required.

In conclusion, concerns about the impact of commercial IXPs on internet neutrality and the potential for government control highlight the need for careful regulation and oversight in the management of IXPs. The concept of interplanetary IXPs adds an intriguing dimension to the discussion, emphasizing the evolving nature of internet infrastructure as technology and human exploration progress.

Joseph

The use of Virtual Private Networks (VPNs) is a topic that sparks controversy. VPNs have the ability to bypass internet restrictions, granting users the ability to access sensitive data that may be otherwise blocked. This feature has both positive and negative implications. On one hand, it allows individuals to browse the internet freely, evade censorship and access information that may be crucial in certain circumstances. However, this freedom can also be easily misused, leading to fraudulent activities and infringement on sensitive data.

The argument against the use of VPNs centres around the potential for misuse and harm. Those raising concerns argue that VPNs provide a cloak of anonymity that can enable cybercriminals to carry out illegal activities, such as hacking, fraud and identity theft. By masking their IP addresses and encrypting their online activities, these criminals can disguise their tracks, making it difficult for law enforcement agencies to trace and apprehend them. This creates a significant challenge for cybersecurity and poses a threat to the security of individuals and organisations.

However, it is important to note that VPNs have legitimate applications as well. Many individuals and organisations, such as journalists, activists and businesses, rely on VPNs to protect their sensitive information and maintain privacy. For these users, VPNs provide a layer of security by encrypting their data, making it difficult for hackers or prying eyes to intercept and exploit it. In this context, VPNs are seen as valuable tools for safeguarding data and ensuring the protection of individual content on the internet.

The need for protective measures for individual content on the internet is a relevant concern in today’s digital age. As more and more information is stored and shared online, the risk of cyber threats and data breaches increases. This issue is closely linked to topics of internet security, cyber safety and data protection. With the rise of cybercrimes and the increasing value of personal data, it is crucial to find a balance between protecting privacy and ensuring the safety of individuals and society as a whole.

In conclusion, the use of VPNs is a contentious matter. While VPNs can provide internet users with greater freedom and privacy, their potential misuse raises legitimate concerns. The debate surrounding VPNs highlights the importance of balancing individual privacy rights with the need for cybersecurity measures. Solutions that address these concerns while preserving internet accessibility and protecting sensitive data are crucial for tackling this complex issue.

Jane R. Coffin

This extended summary provides a more detailed overview of the main points, arguments, evidence, and conclusions present in the provided text. It also includes noteworthy observations and insights gained from the analysis.

1. Importance of funding small networks in the United States:
– The text highlights the importance of funding small networks, specifically in rural and underserved areas.
– It recognises the lack of connectivity in certain areas in the US and the need for creative and innovative funding solutions.
– The argument is strongly in favour of funding small networks to bridge the digital divide and reduce inequalities in access to the internet.

2. Open connectivity and fewer regulations:
– There is a call for open connectivity and the need to reduce regulations to foster innovation.
– The text mentions the importance of keeping internet exchange points open with fewer regulations.
– The argument is positive and emphasises the benefits of promoting open connectivity for industry, innovation, and infrastructure development.

3. Concerns about the erosion of core internet values:
– The text raises concerns about the erosion of openness, interoperability, global connection, and permissionless innovation.
– Certain countries and international organisations are observed attempting to regulate internet exchange points.
– The argument expresses a negative sentiment towards the potential threat posed to the core values of the internet.

4. Advocacy for community networks and competition in connectivity:
– The importance of community networks for building networks that serve the community, with the community, and by the community is emphasised.
– The text highlights regulations that prohibit community networks and stresses the need for more network diversification and competition in connectivity.
– The argument is in favour of community networks and advocates for their importance in reducing inequalities in access to the internet.

5. Need for inclusive, multi-stakeholder policymaking and regulation:
– The text argues for inclusive and multi-stakeholder inclusion in policymaking and regulation.
– It suggests that neglecting smaller networks, internet exchange points, and other stakeholders may lead to forced centralisation.
– The sentiment is negative towards the exclusion of certain groups and emphasises the importance of diverse perspectives in regulatory decision-making processes.

6. Observations on unintended consequences in policymaking:
– The text suggests that excluding civil society, the technical community, and academia from policymaking may lead to unintended consequences and forced centralisation.
– The negative sentiment arises from the potential negative impact of excluding certain stakeholders from decision-making processes.

7. The role of the Internet Governance Forum (IGF) and the multi-stakeholder model:
– The text highlights the obligation of the IGF and the uniqueness of the multi-stakeholder model in working with governments for better policy formation.
– The argument is positive, emphasising the need for collaboration between the IGF, governments, and other stakeholders to improve policymaking and regulation.

8. Possibility of exchange points in space with Low Earth Orbiting Satellites (LEOs):
– Relevant research funded by the Internet Society Foundation explores the possibility of exchange points in space using LEOs.
– The argument remains neutral, presenting this as an area of exploration for future developments in internet infrastructure.

9. Issues surrounding control over traffic in LEO constellation networks:
– The complex nature of control over traffic in LEO constellation networks is acknowledged.
– Complications arise in negotiating cross-border connectivity issues with transmissions between countries.
– The argument takes a negative stance towards a potential concentration of control in the hands of a single entity or company.

10. Acknowledgement of different types of internet exchange points:
– The text acknowledges that some countries require traffic monitoring at exchange points.
– It recognises the existence and role of both neutral, bottom-up internet exchange points and government-managed ones.
– The sentiment is neutral, neither positive nor negative.

11. Support for encryption and potential relevance of cryptocurrencies:
– The importance of encryption in protecting the privacy of internet traffic is acknowledged.
– While the support for encryption is positive, there is no significant interest expressed in cryptocurrencies at present.
– The sentiment is positive, emphasising the importance of privacy and security in internet communications.

12. Overall sentiment towards the future of the internet:
– The analysis reveals a positive sentiment towards keeping the internet open, secure, and globally connected.
– The text recognises the need for collaboration, open connectivity, and innovative funding solutions to bridge the digital divide and reduce inequalities.
– There is a strong emphasis on the core values of the internet and the importance of multi-stakeholder involvement in policymaking and regulation.

In conclusion, the text highlights the importance of funding small networks, the need for open connectivity, and concerns about the erosion of core internet values. It advocates for community networks, competition in connectivity, and inclusive policymaking to avoid forced centralisation. The role of the Internet Governance Forum and the multi-stakeholder model is recognised, and potential developments in internet infrastructure, such as exchange points in space, are explored. Encryption and privacy also receive positive support. Overall, the sentiment emphasises the need to keep the internet open, secure, and globally connected.

Olivier Crepin-Leblond

The Dynamic Coalition, led by Olivier Crepin-Leblond, extends an invitation to individuals to join their year-round discussions. Notably, there is no requirement for a membership fee, making it inclusive and accessible to a wide range of participants.

The work of the Dynamic Coalition holds significance, as they will be creating a report based on their sessions. This report will be taken into account in the Internet Governance Forum (IGF) messages for the Kyoto meeting, emphasizing the recognition of the Coalition’s efforts and their valuable contributions.

The initiatives of the Dynamic Coalition align with two Sustainable Development Goals (SDGs): SDG 9, focusing on industry, innovation, and infrastructure, and SDG 17, emphasizing partnerships for goal achievement. This demonstrates the Coalition’s commitment to contributing to the global sustainable development agenda.

Overall, the Dynamic Coalition, under the leadership of Olivier Crepin-Leblond, provides an open platform for discussions and collaboration. Their dedication to producing a report that influences internet governance decisions highlights the importance of their work. Furthermore, by aligning their efforts with key SDGs, the Coalition showcases its commitment to contributing to global sustainable development goals.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

DC-Gender Disability, Gender, and Digital Self-Determination | IGF 2023

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Gunela Astbrink

The panel discussion focused on the topics of digital self-determination and accessibility, highlighting the importance of empowering individuals and communities to have control over their digital data. Digital self-determination was described as the need to reconsider how individuals and communities can have autonomy over their digital selves. The panel acknowledged that society is still trying to understand the relationship between our lives and the technologies we use.

The discussion emphasized the need to address the digital divide, particularly for marginalized groups such as women, queer, trans persons, and those with disabilities. The panel aimed to make digital self-determination a reality for these groups by shedding light on their unique challenges and perspectives. Feminist perspectives played a central role in the discussion, with a specific focus on women, queer, and trans persons with disabilities.

One key argument made during the panel was that digital tools should be designed with accessibility in mind. It was stated that as a disability community, their motto is “nothing about us without us,” which means that persons with disabilities should be included in the development processes and community discussions. The panel stressed the need for all digital tools to be accessible and usable for all individuals, regardless of their disabilities.

Additionally, the importance of education and empowerment for people with disabilities in the digital sphere was emphasized. The panel shared a story of a determined young woman from Malawi who, despite having a disability and coming from a poor family, managed to study IT. Her education not only empowered her but also enabled her to tutor other students and utilize digital tools, even with her physical limitations. This example demonstrated the transformative power of education in enabling individuals with disabilities to actively participate online.

The panel also raised concerns about privacy and security, particularly for people with disabilities. They acknowledged the potential privacy and security issues that individuals with disabilities, especially those with visual impairments, might face. The need to ensure the privacy and security of these individuals was underscored, emphasizing the importance of safeguarding their personal information and digital presence.

In conclusion, the panel discussion on digital self-determination and accessibility provided valuable insights into the challenges faced by marginalized groups, particularly women, queer, trans persons, and individuals with disabilities. It stressed the importance of designing digital tools with accessibility in mind and promoting education and empowerment to enable active online participation for people with disabilities. Moreover, the panel emphasized the need to ensure privacy and security for individuals with disabilities, recognizing the unique risks they may encounter. Ultimately, the panel highlighted the significance of integrating inclusivity and accessibility into all aspects of the digital realm.

Judy Okite

The analysis emphasises the significance of accessibility for individuals with disabilities, both in physical and online spaces. It reveals that the evaluation of government websites for accessibility showed that 20% of the content remains inaccessible, indicating a pressing need for improvement. This highlights the lack of inclusivity and the barriers faced by persons with disabilities when accessing online information and services.

Furthermore, the analysis argues that individuals with disabilities must be actively involved in the process of creating accessible spaces and developing inclusive technology. It references Judy Okite’s experience in Dar es Salaam, where insufficient provisions for accessibility were observed. This illustrates the importance of including the perspectives and needs of persons with disabilities in the planning and design of physical environments to ensure that all individuals have equal access and opportunities.

In addition to physical spaces, the analysis also stresses the need for awareness and empowerment about rights among individuals with disabilities. Judy Okite’s assertion of her rights for accessible facilities during her stay in Dar es Salaam highlights the importance of advocating for and asserting these rights. The analysis further states that persons with disabilities should have a say in determining what works for them or not, enhancing their autonomy and agency in decision-making processes.

Overall, the analysis stresses the need for greater attention to accessibility in both physical and online spaces. The evaluation of government websites and Judy Okite’s experiences serve as evidence of the existing barriers and the urgent need for improvement. It argues that involving individuals with disabilities in the design and development of accessible spaces and technology, as well as promoting awareness and empowerment about their rights, can lead to a more inclusive society.

Audience

The implementation of certain features, specifically Zoom’s automatic captions, has had negative consequences for individuals with disabilities, particularly those who are deaf or hard-of-hearing. These automatic captions, intended to enhance accessibility, have instead led to confusion and disempowerment. This is due to the overlapping of captions in multiple languages, which obstructs the reliance on captions and lip-reading that these individuals heavily depend upon.

In order to avoid such detrimental effects, it is argued that technology companies should collaborate closely with individuals with disabilities and conduct comprehensive user research prior to implementing new features. By involving the very users who will be utilizing these features, technology companies can gain valuable insights that will result in more inclusive technology. This call for collaboration and user research is further supported by the incident involving Zoom, which serves as an example of the negative consequences that can arise from a lack of proper user research.

Furthermore, the importance of inclusive technology development is emphasized as a means to reduce inequalities and enhance accessibility. It is asserted that by working closely with intended users, technology companies can create technology that caters to the diverse needs of individuals with disabilities. This collaborative approach ultimately leads to more inclusive technology that empowers individuals rather than inhibiting their capabilities.

To conclude, the implementation of certain features, such as Zoom’s automatic captions, has had unintended negative consequences for individuals with disabilities. To address and prevent such issues, it is crucial for technology companies to engage in comprehensive user research and collaborate closely with individuals with disabilities throughout the development process. By doing so, technology companies can create technology that is truly inclusive and empowers individuals with disabilities.

Nirmita Narasimhan

The analysis highlights the importance of policies in ensuring compliance with accessibility standards. Countries with clear policies are more likely to effectively implement accessibility measures, as policies provide guidelines on what needs to be done, how to do it, and where it should be implemented. This is seen as a positive factor in promoting accessibility. The analysis also advocates for the creation and implementation of policies in countries where they do not exist, as well as the strengthening of existing policies to promote equal access to rights and opportunities for all individuals, including those with disabilities. While many countries have incorporated the Convention on the Rights of Persons with Disabilities (CRPD) into their legislation, the analysis suggests the need for the development of domain-specific policies to address specific accessibility issues in various domains. Different strategies for advocacy are required in different situations, as evidenced in the context of India. Active involvement of persons with disabilities in advocacy and policy-making processes is emphasized, as their perspectives should be adequately represented. The analysis also stresses the need for mainstream products to be universally designed, taking into consideration varying user needs and abilities. A user-centric approach in product design and enhancement is deemed essential to improve accessibility. Overall, the analysis underscores the significance of policies, the involvement of persons with disabilities, and the user-centric approach in achieving accessibility goals.

Debarati Das

During the analysis, several significant points were raised by the speakers. A central topic of discussion was the concept of digital self-determination, which highlights the need to understand who we are as digital beings as our digital footprints continue to grow. This evolving concept addresses critical questions surrounding the ownership and control of our data in cyberspace, affirming that a person’s data is an extension of themselves. It emphasises the importance of considering the rights and autonomy of individuals in the digital realm.

One key insight that emerged from the analysis was the significance of examining the experiences of individuals with disabilities in relation to digital self-determination. It was observed that digital spaces and decisions driven by data can greatly impact the autonomy and agency of individuals with disabilities. Therefore, there is an urgent need to explore how individuals can exercise control over their digital identities and have autonomy over their digital selves. By unpacking digital self-determination through the lens of the experiences of persons with disabilities, efforts can be made to reduce inequalities and promote inclusivity in the digital world.

Another important point discussed was the value of Design Beku and its principles of Design Justice in the field of design. Design Beku, a design and digital collective founded by Padmini Ray Murray, advocates for designing with communities, as opposed to designing for them. This approach aligns with the principles of design justice, which include ethics of care, feminist values, participation, and co-creation. By involving communities in the design process, Design Beku strives to create more inclusive and equitable solutions that address the diverse needs of different groups. This approach contributes to achieving the Sustainable Development Goals related to industry, innovation, infrastructure, reduced inequalities, and gender equality.

In conclusion, the analysis underscored the importance of digital self-determination, specifically in understanding our digital identities and asserting control over our data. It emphasized the significance of considering the experiences of individuals with disabilities to promote autonomy and agency in digital spaces. Additionally, the value of Design Beku and its Design Justice principles in advocating for inclusive and community-centered design practices was highlighted. These discussions provide valuable insights for addressing the challenges and opportunities associated with industry, innovation, infrastructure, reduced inequalities, and gender equality in the digital age.

Manique Gunaratne

Technology plays a crucial role in enabling individuals with disabilities to participate equally in society. Assistive devices and technologies act as a bridge between people with disabilities and their environment, allowing them to perform tasks that they might otherwise find challenging or impossible. This can include devices such as mobility aids, hearing aids, and communication tools. With advancements in technology, artificial intelligence (AI) has emerged as a powerful tool in improving the lives of people with disabilities. AI has the potential to make life easier for individuals with disabilities by developing solutions that cater to their specific needs and requirements.

However, cost proves to be a complex barrier to accessing technology for individuals with disabilities. While emerging technologies, such as AI and smart glasses, hold promise in enhancing the lives of people with disabilities, they often come with a hefty price tag. This poses a significant challenge, as many individuals with disabilities may struggle to afford these expensive technologies. The high cost of such innovations acts as a deterrent, limiting the accessibility of these technologies to a privileged few. Therefore, there is a need for collaborative efforts between technology developers, policymakers, and advocacy groups to address this issue and ensure that cost does not impede access to life-changing technology for individuals with disabilities.

Moreover, entertainment and emotional recognition technologies can greatly benefit certain disabilities, such as autism and intellectual disabilities. Emotional recognition technologies can assist individuals with these disabilities in understanding and interpreting emotions, which can contribute to enhancing their social interactions and overall well-being. Accessible platforms and games are also vital for providing entertainment to people with disabilities. These platforms cater to their unique accessibility needs and ensure inclusive participation in entertainment activities.

In conclusion, technology holds immense potential in empowering individuals with disabilities and enabling their full participation in society. Assistive devices and technologies act as enablers that bridge the gap between people with disabilities and their environment. AI, in particular, has revolutionized the landscape by offering tailored solutions to the needs of individuals with disabilities. However, the high cost of emerging technologies presents a challenge to their widespread accessibility. It is crucial for stakeholders to address this issue and work towards ensuring that cost does not impede access to these life-changing technologies. Furthermore, the development of entertainment and emotional recognition technologies specifically tailored for individuals with disabilities can greatly contribute to their well-being and quality of life. By embracing and advancing technology, we can create a more inclusive and accessible society for all.

Vidhya Y

The use of digital platforms has brought both positive and negative implications for individuals with visual impairments. On the positive side, these platforms have opened up new opportunities for communication and independence. Email, for instance, has revolutionised written communication, which was not previously possible without the advancement of technology. Digital tools, such as apps designed to identify colours and currency, have also empowered visually impaired individuals by providing them with greater independence and autonomy.

Furthermore, assistance tools like ‘Be My Eyes’ have proven to be invaluable resources for visually impaired individuals. These tools connect visually impaired individuals with sighted volunteers who can assist them in various online tasks, such as reading CAPTCHAs. This collaboration demonstrates the power of digital technology in providing inclusive and supportive environments for visually impaired individuals. Moreover, these tools can be used creatively for tasks like matching clothing colours, further enhancing the independence and quality of life for those with visual impairments.

However, there are also negative aspects that must be addressed. Accessibility remains a significant challenge for visually impaired individuals in the digital space. Many websites are primarily image-based and lack proper labelling, rendering them impossible to navigate using assistive technologies. This accessibility barrier hinders visually impaired individuals’ ability to access information and participate fully in the online world. Additionally, understanding and keeping up with new features and technologies can be daunting for visually impaired individuals, as design choices are often not optimized for their needs.

Moreover, women with disabilities face additional challenges in digital spaces. Privacy and vulnerability concerns are particularly prominent, as crowded environments or the use of screen readers may compromise their privacy when using digital platforms. This puts them at a disadvantage, highlighting the need for further measures to ensure the digital space is inclusive for all individuals, regardless of gender or disability.

In conclusion, the digital space presents both empowering and challenging aspects for individuals with visual impairments. While digital platforms have provided newfound opportunities for communication and independence, there are still accessibility issues that need to be addressed to ensure inclusivity. Furthermore, women with disabilities face unique challenges, emphasising the importance of considering diverse perspectives and needs in the development of digital tools and platforms. By addressing these challenges, we can create a more inclusive digital environment that truly benefits all individuals.

Padmini Ray Murray

The implications of surveillance capitalism and device use are particularly burdensome for disabled individuals. These individuals face additional challenges and risks due to the compromised nature of the devices they rely on. Unfortunately, most technology designs targeted at disabled users fail to consider these implications, exacerbating the difficulties they already face.

To address this issue, it is crucial to establish effective communication channels with disabled users in order to fully understand their specific needs and requirements. By engaging in conversations with designers and technologists, disabled individuals can provide valuable insights that can inform the development of more accessible and inclusive technologies. This collaboration can lead to better solutions that truly meet the needs of disabled users, going beyond basic accessibility requirements.

Furthermore, marginalized populations, including disabled individuals, are particularly vulnerable to privacy and surveillance issues. These groups often have limited opportunities for recourse when their privacy is compromised. It is imperative to pay special attention to the impact of surveillance on disabled users and their ability to exercise self-determination. Ensuring their privacy and autonomy is essential for promoting inclusivity and reducing inequalities.

One of the challenges in technology design is the tendency to create products at scale, which hinders the ability to provide more nuanced and individualized user experiences. Technology development often prioritises mass production and standardisation, which leaves little room for customisation. However, creating customised products requires a paradigm shift in thinking, moving away from one-size-fits-all approaches. Artificial Intelligence (AI) can play a crucial role in achieving this shift by enabling more personalised and tailored solutions for disabled users.

In conclusion, there is a pressing need to create more individualised and user-tailored experiences in technology design. This entails actively involving disabled individuals in the design process, fostering collaboration between designers, technologists, and users. Additionally, advocating for their rights and addressing the unique privacy concerns they face is crucial in building a more inclusive and equitable technological landscape. By embracing a paradigm of customisation and leveraging the potential of AI, we can empower disabled users and ensure their needs are met in a more meaningful and comprehensive manner.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

DC-OER The Transformative Role of OER in Digital Inclusion | IGF 2023

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Dudley Stephen Wyber

Libraries and librarians have a significant role to play in the realm of Open Educational Resources (OER). They serve as catalysts for the discovery, awareness, and curation of OER while helping to overcome biased views about their value. Libraries actively update their roles by connecting individuals who need knowledge with available resources, thus raising awareness of the potential benefits that OER can offer.

Librarians, in particular, contribute to the curation of OER by evaluating these resources in line with the needs of faculty and other stakeholders. They bridge the gap between various resources and users, identifying any gaps or deficiencies in the existing OER portfolio. Librarians assist in ensuring that faculty and stakeholders have access to a comprehensive collection of OER.

It is important to note that the OER landscape is currently dominated by a few regions of the world. This geographic imbalance highlights the need for greater collaboration and dissemination of OER from a global and inclusive perspective. Librarians can empower stakeholders to create and share their own OER, contributing to a more diverse and inclusive OER ecosystem.

Librarians’ involvement extends beyond curation and dissemination. They provide guidance on usage rights and assist stakeholders in navigating complex legal frameworks surrounding copyright. Librarians can advocate for better regulatory frameworks that include robust educational exceptions in copyright laws, ensuring that OER are not only accessible but also legally protected and supported.

Dudley Stephen Wyber emphasizes the importance of adopting a recurring circular learning approach in education. This model advocates for active learning and participation, encouraging individuals to learn, explore, contribute, and continuously improve. Wyber also underscores the active involvement of teaching professionals and librarians in facilitating the use of online resources. According to Wyber, simply making educational content available online is insufficient; active facilitation and support are necessary to foster uptake and utilization.

Librarians should feel confident and responsible for guiding faculty and students to make the most of OER. By providing support and assistance, librarians enhance the educational experience and help individuals maximize the benefits offered by OER.

Additionally, there is a suggestion to apply the interoperability logic used to achieve compatibility between Open Access (OA) repositories to OER repositories. The work done by organizations such as COAR in Canada serves as a reference in this regard. Interoperability between repositories would enable seamless sharing and integration of OER, contributing to the growth and effectiveness of the OER ecosystem.

Finally, it is essential to strive for equity and parity between OER and Open Access. OER should be brought to the same level of recognition and value as Open Access, creating a system where both types of resources are equally supported and encouraged. This would foster a more open and inclusive education system, benefiting learners and educators worldwide.

In conclusion, libraries and librarians play a multifaceted role in the realm of OER. They contribute through the discovery, awareness, and curation of OER, bridging the gaps between available resources and users. Additionally, librarians guide stakeholders in utilizing rights, creating their own OER, and advocating for favorable legislative and regulatory frameworks. Their involvement, combined with the adoption of recurring circular learning approaches and the pursuit of interoperability and equity, is vital in realizing the full potential of OER in facilitating quality education for all.

Tawfik Jelassi

Open Educational Resources (OER) play a pivotal role in increasing access to quality education worldwide. In 2019, UNESCO adopted the recommendation on OER, a UN normative instrument to support inclusive access to digital learning platforms. This highlights the significance and recognition of OER in the educational landscape.

The recommendation by UNESCO advocates for the use of openly licensed digital education tools that can be accessed through the Internet. By embracing OER, educational institutions and learners can benefit from a wide range of freely available, adaptable, and shareable educational materials. This promotes inclusivity and equal opportunities for learners globally.

UNESCO’s emphasis on OER aligns with the Sustainable Development Goals (SDGs), particularly SDG 4: Quality Education. OER contributes to the achievement of multiple SDGs, including quality education, access to information and ICT, gender equality, and global partnerships. The adoption and implementation of OER can help bridge educational gaps, address gender disparities, and foster collaboration among nations.

Moreover, OER is part of the broader concept of digital public goods. These digital resources, including OER, drive sustainable models of education, knowledge sharing, and innovation. The 2019 OER recommendation highlights the importance of international collaboration for content, capacity, and infrastructure development, aligning with the Global Digital Compact principles. These principles promote an inclusive, open, secure, and shared Internet, enabling widespread access to knowledge and educational resources.

In addition to the global significance of OER, there is a recognition that the internet should be used as a force for good. UNESCO envisions a digital ecosystem where the internet serves as a powerful tool for learning, advancing human rights, and sustainable development. The internet has the potential to facilitate access to information, promote freedom of expression, and provide opportunities for lifelong learning.

To guide the development and use of the internet responsibly and inclusively, UNESCO established the OER Dynamic Coalition. This coalition brings together stakeholders from various sectors to build values and principles guiding the development and use of the internet. The coalition aims to ensure that the internet is harnessed as a tool for education while also promoting peace, justice, strong institutions, and partnerships.

In conclusion, the adoption and promotion of Open Educational Resources are vital for enhancing access to quality education worldwide. The UNESCO recommendation on OER highlights the importance of openly licensed digital education tools accessible through the Internet. By embracing OER, stakeholders can contribute to the achievement of the SDGs, drive sustainable models of education and innovation, and utilize the internet as a powerful tool for learning while advancing human rights and sustainable development. The establishment of the OER Dynamic Coalition further showcases the commitment to shaping the future of education inclusively and responsibly.

Audience

During the discussion, the speakers exhibited curiosity and a desire to understand the best practices related to decentralised repositories and open technologies. The conversation extensively explored various aspects of the implementation and functioning of these concepts.

Both speakers maintained a neutral stance throughout the discussion, refraining from taking a definitive position. However, they did not provide any specific supporting facts or evidence, leaving the conversation open-ended.

The Sustainable Development Goals and their connection to decentralised repositories and open technologies were not mentioned during the dialogue. This suggests that the primary focus of the conversation was to explore the concepts themselves rather than their potential impact on sustainable development.

The main takeaway from the discussion was the speakers’ curiosity about best practices in decentralised repositories and open technologies. Although the lack of supporting evidence or detailed arguments may indicate that this was an introductory exploration or a starting point for further research, it is important to note that no additional noteworthy observations or insights were identified.

Overall, the conversation revolved around the speakers’ neutral interest in decentralised repositories and open technologies, without delving into specific examples, cases, or implications.

Neil Butcher

The analysis examines various arguments and stances regarding education policies and their impact on sustainability, intellectual property, digital accessibility, procurement processes, and the quality of teaching materials. These arguments provide insights into the importance of effective policy implementation and its influence on achieving sustainable development goals.

A key point highlighted is the need for policies to enable government agencies to use open licences. Without such provisions, it is unlikely that open licences will be effectively utilised. Another crucial aspect is the inclusion of accessibility considerations in procurement processes. The analysis argues that accessibility should not be overlooked during contract execution, as it may compromise the educational experience for individuals with disabilities.

The quality of accessible teaching and learning materials is also a prominent focus. The analysis suggests that an excessive emphasis on quantity and accessibility could overlook the importance of quality. Instead, curated collections of resources that promote high-quality teaching and learning experiences are proposed.

The government’s responsibility in ensuring accessible and supportive public education systems for all is emphasized. The analysis states that the government plays a crucial role in providing accessible and supportive education, regardless of individuals’ backgrounds or abilities. Additionally, the monetization of the education space by the private sector is critiqued, with an argument for prioritising the quality of teaching and learning experiences over financial gains.

Investment strategies in education are highlighted as a means to prioritize the quality of teaching and learning experiences for everyone. Adequate investment in education is seen as essential in providing a conducive learning environment and promoting positive outcomes for all learners.

Open Educational Resources (OER) are also scrutinized, with a warning against compromising the quality of learning experiences while expanding access. If OER does not ensure high-quality learning experiences, it may be detrimental to education.

Furthermore, the analysis emphasizes the importance of community representation in improvement processes within education. Representatives from the target communities of learners should lead improvement efforts, ensuring that the education system meets their specific needs and addresses inequalities.

In conclusion, the analysis presents various perspectives on education policies and their implications for sustainability, intellectual property, digital accessibility, procurement processes, and the quality of teaching materials. Key takeaways include the importance of effective policy implementation, the need for open licences and accessibility considerations, the role of the government in providing accessible public education, critiquing the monetization by the private sector, the significance of investment strategies for quality education, the impact of OER on learning experiences, and the importance of community representation in improvement processes within education.

Tel Amiel

Open Educational Resources (OER) projects require sustainable funding to ensure their development and continued existence. This funding can be obtained through partnerships and donations from foundations. However, the success of sustainable funding models, such as open procurement, may vary in different contexts.

The practices surrounding OER and community engagement are essential factors for their success. Without active community involvement, the implementation of OER loses its meaning. It is crucial to foster collaboration and engagement within the educational community to maximize the benefits of OER.

Policies alone are insufficient to guarantee the effective implementation of OER initiatives. They need to be actively monitored by a diverse set of stakeholders. Involving various individuals and organizations from different sectors ensures that the implementation remains aligned with the goals and objectives of OER. Additionally, OER should be seen as an evolving concept that requires ongoing monitoring and adaptation to meet changing educational needs.

OER possesses unique qualities that make it a real public good, particularly in multi-stakeholder processes. Its adaptability, remixability, and reusability enable the inclusion of diverse cultural groups and cater to different educational requirements. Engaging with these resources in a pedagogical context enhances their value as a public good.

The potential of OER is currently understated, especially in interconnected, multilateral contexts. There is a need for further exploration and utilization of OER to maximize their impact. OER’s ability to share, revise, remix, and reuse content makes it a valuable resource that can enhance education on a global scale.

Successful implementation of OER requires the allocation of serious responsibilities and the active involvement of individuals. Without meaningful participation and responsibility, OER initiatives may stagnate and fail to realize their objectives. Therefore, it is crucial to involve people at all stages of the implementation process to ensure the effective utilization of OER.

In conclusion, sustainable funding is crucial for the success of OER initiatives, and partnerships and donations from foundations can provide the necessary financial support. Open procurement models are advocated by governments for sustainable funding, but their effectiveness may vary depending on the context. Community engagement, active monitoring by stakeholders, and recognizing the unique qualities of OER as a public good are vital for their successful implementation. Further exploration and utilization of OER are needed, especially in interconnected, multilateral contexts. Meaningful implementation of OER requires the involvement and allocation of responsibilities to individuals. Without active participation, OER risks becoming stagnant legislation with limited progress.

Moderator – Michel Kenmoe

Various stakeholders engaged in discussions about the importance of Open Education Resources (OER) and the challenges associated with its adoption. It was universally agreed that raising awareness among decision makers is crucial for OER adoption. Decision makers play a significant role in implementing and supporting OER initiatives. Developing OER strategies helps raise awareness and garner support from stakeholders.

The involvement of middle to top-level management was seen as vital for the successful implementation of OER. Without their support, gaining buy-in and implementing the recommendations for OER adoption would be difficult. This highlights the importance of securing support from influential individuals within educational institutions and policymaking bodies.

One major challenge in realizing OER strategies is concerns over funding. Governments are particularly concerned about finding adequate resources to support OER implementation. One suggested solution is for governments to ensure that part of the budget for OER production is supported by donors. This approach would alleviate the financial burden on governments and facilitate the production of open educational resources.

Designing OER strategies requires a collective effort involving multiple stakeholders. It was observed that five countries successfully developed their OER strategies through such collective efforts. This highlights the importance of engaging all relevant stakeholders, including educators, policymakers, and educational institutions, in developing and implementing OER strategies.

An important observation from the discussions is that many West African countries lack a dedicated budget for educational resource production. This poses a significant challenge to implementing OER strategies. The absence of a budget specifically allocated to educational resource production hinders the development and dissemination of OER. Therefore, it is imperative to raise awareness about the importance of investing in educational resource production and secure adequate funding to support OER initiatives.

In conclusion, the discussions on OER emphasized the need for raising awareness among decision makers, securing middle to top-level buy-ins, addressing funding concerns, fostering collective efforts involving multiple stakeholders, and promoting investment in educational resource production. These insights are crucial for the successful adoption and implementation of OER, contributing to the goal of quality education (SDG 4) and partnerships for sustainable development (SDG 17).

Patrick Paul Walsh

The stakeholders involved in the discussion, including government, academia, the private sector, and intergovernmental systems, agree that engagement is crucial for a comprehensive partnership. They recognize the need to work with UNESCO, SDSN, and a joint committee to implement the UNESCO-EOR recommendation. Additionally, there is a partnership agreement in place to manage an open education resource overlay platform, repository, or journal.

To ensure the quality of submitted courses, a rigorous quality assurance process has been established. Courses are evaluated not only for their academic and scientific content but also for compliance with UN policies and legal frameworks. The objective is to provide a community of practice with guidelines and playbooks on ensuring quality in submitted courses.

Various educational technologies are being used to manage and organize the courses. This includes open journal systems, copyright licensing management, and other tech tools. The effective utilization of these technologies is considered essential for managing the courses.

Community engagement is emphasized as a crucial aspect of the project. Collaborating with various user groups such as governments, corporates, academics, and schools is necessary to develop the required metadata and effectively manage the archives. This collaboration is referred to as “diamond engagement” and is seen as essential for the system to work effectively.

The freedom to create and contribute to a global knowledge commons is a fundamental principle. The open education resource recommendation supports the creation and contribution of educational content to the global knowledge commons. The content should be easily accessible, and everyone should have the opportunity to contribute freely.

The project also places importance on accessibility and inclusivity. Materials, including slides and videos, should be made accessible to all, including those with visual impairments. Ensuring compliance with disability regulations and providing equal access for everyone is considered crucial.

The decentralization and adaptability of open education resources to local contexts are promoted. It is essential to make sure that the resources can be repurposed and translated to suit specific local contexts. This flexibility ensures that the resources remain relevant and applicable in different regions.

There is a concern about the control of academic work archival by commercial entities. The argument is that academic works should not be owned by private entities, and hosting and archiving should be done by libraries rather than commercial entities.

Decentralized repositories are seen as beneficial as they allow for easy updates of courses. This enables courses to be updated locally and reuploaded to the system, ensuring that the content remains up-to-date and relevant.

Behavioral issues and the psychology of implementing digital infrastructure are important factors to consider. Jeffrey Sachs has highlighted the reality of sunk costs in initiating such projects, and the marginal costs of implementing digital infrastructure are relatively low. There is also the potential to add commercial value to the project, which could eventually generate returns on investment.

Government mistrust in receiving returns on their investments poses a significant challenge. The argument is that governments need to invest now for future returns, but past experiences of not receiving expected returns have eroded their trust.

There is disagreement regarding the commercialization of open education resources. While some reject the idea of commercializing the infrastructure or content, others propose value-added commercialization with profit-sharing arrangements if a private entity gains income from the public resource.

Advocacy exists for public or stakeholder ownership of open education resources. The argument is that open education resources should be either publicly owned or owned by relevant stakeholders to ensure their accessibility and availability to all.

In conclusion, the stakeholders involved in the discussion emphasize the importance of engagement in building a comprehensive partnership. Quality assurance processes have been implemented to ensure compliance with UN policies and legal frameworks. Various educational technologies are being utilized to manage the courses effectively. Community engagement is crucial for developing metadata and managing archives. The discourse on open education resources highlights the freedom to create and contribute to a global knowledge commons, as well as the need for accessibility, decentralization, and public ownership. Behavioral issues and government mistrust pose challenges, but there are also opportunities for commercial value and return on investment. Collaborative efforts and a shared vision are crucial for the successful implementation of open education resources and the promotion of quality education for all.

Melinda Bandaria

In order to create a more inclusive education system, it is crucial for teachers to have an awareness of who is excluded and the reasons behind their exclusion. Some common barriers include the cost of learning materials, physical challenges such as hearing or sight impairment, language barriers, and cultural diversity. By understanding these barriers, teachers can better address the needs of excluded students.

To enable more inclusive teaching and learning, teachers should possess knowledge of accessibility guidelines, universal design for learning, and cultural and linguistic diversity. The Web Content Accessibility Guidelines provide a framework for making online platforms accessible to different types of learners. Integrating the basic principles of universal design for learning into Open Educational Resources (OERs) ensures that they can be accessed by all students. Furthermore, translating OERs into local languages and respecting cultural diversity can enhance inclusivity.

Open Educational Resources (OERs) are a valuable tool in making teaching more inclusive and breaking down barriers. OERs address the cost barrier of learning materials, as they are freely available for use. They can also be modified to integrate features of universal design for learning, tailored to meet the needs of diverse learners. Additionally, translating OERs into local languages ensures that content is accessible to students who face language barriers.

Teachers need to possess the necessary skills and knowledge to make OERs more accessible and inclusive. Training programs for teachers should include training in cultural and linguistic diversity, understanding copyright laws and licences associated with OERs, and the ability to convert OERs into alternative formats such as OJO, Braille, and simplified text. Making OERs compatible with assistive technology and determining the readability of materials are also important skills for teachers to have.

The training for teachers should not stop at developing OER materials but should go beyond that to include a wide range of knowledge and skills to make OERs more inclusive and accessible. This requires ongoing learning and continuous professional development. Teachers should not only develop and share OERs but also make them accessible and inclusive for all learners, which necessitates additional knowledge and skills.

To ensure the quality of OERs, a quality assurance framework is important. This framework enables the evaluation of the OERs that teachers use, ensuring that they meet certain standards of quality. It serves as a guide for teachers in selecting and utilising high-quality OERs that enhance inclusivity in education.

Both teachers and universities have a role to play in ensuring the quality of OERs. Teachers are crucial in creating and sharing OERs, while universities can support them in this process. OERs are often reused, remixed, translated into local languages, and shared by teachers and universities, making collaborative efforts essential in enhancing the quality and inclusivity of OERs.

Policies should be implemented to promote the development and use of OERs. Institutional policies can actively encourage the use of OERs, creating a supportive environment for teachers. Moreover, it is beneficial to use public funds to produce OERs and make them open access, ensuring that cost is not a barrier to their availability.

Incentive systems for faculty members are also important in promoting the use and creation of OERs. Especially for universities, providing incentives to teachers and faculty members who utilize and create open educational resources helps foster a culture of innovation and inclusivity in education.

In conclusion, creating a truly inclusive education system requires teachers to have an understanding of barriers and exclusion, as well as the necessary skills and knowledge to make learning materials accessible and inclusive. Open Educational Resources (OERs) serve as a powerful tool in overcoming barriers and promoting inclusivity. By implementing policies and providing support, both teachers and universities can play a vital role in ensuring the quality and accessibility of OERs. With ongoing training and incentives for faculty members, education can become more inclusive for all learners.

Zeynep Varoglu

The OER (Open Educational Resources) Recommendation 2019 was unanimously adopted by all member states, providing a clear definition of OER and focusing on capacity building, policy implementation, quality assurance, inclusive multilingual OER, sustainability, and international cooperation. Zeynep Varoglu played a significant role in presenting and supporting the OER Recommendation 2019.

Open procurement models have become popular for developing and sustaining OER projects, although their effectiveness can vary depending on the country or context. While open procurement is seen as a transition to a more sustainable OER model, its implementation may face challenges in certain countries.

Multi-stakeholder working groups play a crucial role in monitoring policies and ensuring the success of OER initiatives. These groups can adapt to changes in OER through collaboration and representation of perspectives from all stakeholders.

Community engagement is identified as critical for the relevance and success of OER initiatives. Incentives and recognition are important for motivating individuals at all levels to actively participate in advancing OER goals.

The OER Dynamic Coalition event at the Internet Governance Forum (IGF) is a vital platform for knowledge sharing and collaboration among stakeholders. With around 500 participants from government, institutions, and civil society, it focuses on implementing the OER Recommendation.

The importance of openness in education and knowledge sharing is emphasized during the event. Zeynep Varoglu actively supports this idea, advocating for openness in education.

In conclusion, the OER Recommendation 2019 provides a comprehensive framework for the development, implementation, and sustainability of OER initiatives. Stakeholder involvement, such as Zeynep Varoglu’s support and multi-stakeholder working groups, along with community engagement and platforms like the OER Dynamic Coalition event, contribute to advancing OER goals. Emphasizing openness in education and knowledge sharing is crucial for promoting inclusive and quality education globally.

Lisa Petrides

The Institute for the Study of Knowledge Management in Education, led by Lisa Petrides, focuses on various aspects of Open Educational Resources (OER). They are involved in building OER libraries, providing professional development, and researching the impact of OER. Moreover, they emphasize the significance of OER repositories as the infrastructure supporting libraries. The institute promotes the implementation of the CARE framework, which prioritizes good stewardship of OER by emphasizing contribution, attribution, release, and empowerment. They also stress the importance of understanding the provenance of resources to build a transparent knowledge base. Additionally, the institute advocates for the accessibility and inclusivity of OER, viewing educators as experts in their knowledge, promoting decentralization in knowledge distribution, and resisting commercial private partnerships in education. They emphasize the need to integrate various open areas, such as education resources, pedagogy, data, science, access, and publishing, for better outcomes. Through these efforts, the institute aims to contribute to quality education and drive positive changes in the education system.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Climate change and Technology implementation | IGF 2023 WS #570

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Audience

The analysis explores various topics related to climate change and technology in the global south. One key point highlighted is the importance of accountability and responsibility in addressing climate change. It emphasises that governments, corporations, and individuals all need to take responsibility for their actions and work towards mitigating climate change. The analysis also mentions concerns over digital colonisation and the quest for digital sovereignty, particularly in global south countries. It points out the potential exploitation of resources by technology companies from developed nations.

Another topic discussed is the challenge of tackling electronic waste sustainably. While recycling initiatives exist in countries like Brazil, the analysis highlights difficulties in handling electrical and electronic devices due to harmful substances like lithium. It emphasises the need for sustainable solutions to effectively manage electronic waste.

The analysis also examines the search for successful examples of technology mitigating climate change impacts, especially in the Amazon region of the global south. It advocates for leveraging technology to address climate change, reduce emissions, and protect sensitive ecosystems. However, it does not provide specific examples or evidence of successful implementations.

Furthermore, the analysis draws attention to the importance of localising global climate change solutions. It highlights the relatively poor performance of Hong Kong, despite its significant economic power and infrastructure. This suggests the need for tailored solutions that consider local contexts and challenges, rather than relying solely on global strategies.

The role of lobbying and negotiating with decision-makers is also emphasised as a means to advance climate change agendas. The analysis stresses the importance of engaging with policymakers to influence climate-related policies and decisions. However, it does not provide specific evidence or examples of successful lobbying efforts.

The potential of the Internet of Things (IoT) in creating energy-efficient systems and reducing carbon emissions is another topic discussed. The analysis highlights the positive impact that IoT can have on sustainability efforts but does not provide supporting evidence or specific examples.

Lastly, the analysis addresses the need for accountability in adopting costly technologies and the role of lifecycle assessment in defining avoided emissions. It mentions ongoing discussions in Europe regarding the European Green Digital Coalition. This highlights the importance of considering the environmental impact of adopting new technologies and ensuring that the benefits outweigh the costs.

In conclusion, the analysis raises various important aspects related to climate change and technology in the global south. It underscores the need for accountability and responsibility, addresses concerns over digital colonisation and digital sovereignty, discusses challenges in tackling electronic waste sustainably, explores the search for successful technology implementations, advocates for localising climate change solutions, emphasises the importance of lobbying and negotiation, highlights the potential of IoT, and stresses the need for accountability in adopting costly technologies. However, it lacks in-depth evidence and specific examples to support these points. Nonetheless, it raises key issues that require attention and further exploration.

Moderator

Climate change is a pressing global issue that demands immediate action. It is acknowledged as one of the most pressing issues in the world. The seriousness of this concern is emphasized by the devastating impacts of climate change witnessed worldwide, including extreme weather events that serve as evidence that the Earth is changing. Igor, one of the participants, highlights the urgency of taking immediate climate action.

Technology has emerged as a crucial tool in addressing climate change. It is seen as a catalyst for change and offers potential solutions. Various technologies, including renewable energies such as wind, solar, and hydropower, are being utilized to combat climate change. These technologies provide valuable alternatives to traditional energy sources that contribute to greenhouse gas emissions. Furthermore, the session explores how technology can be leveraged to transform social, educational, and environmental aspects, offering concrete solutions to combat climate change.

However, it is crucial to ensure that technology is used responsibly and does not harm the environment. The responsible usage of technology is a fundamental consideration, as it can have adverse effects on the environment. The session emphasizes the need to find ways to ensure that technology does not adversely affect the environment itself, highlighting that great power comes with great responsibility.

Young people are recognized as key actors in addressing climate change. The session highlights the crucial role that young people play in combating climate change. Their active involvement and engagement are crucial for driving change and implementing sustainable solutions.

Artificial intelligence (AI) is also identified as a tool that can assist in mitigating and adapting to climate change. AI can optimize electricity supply and demand, leading to energy consumption savings. AI can also aid in developing early warning systems for severe disasters and accurate climate forecasts, contributing to climate change adaptation efforts.

Despite the positive contributions of technology, there are negative impacts that need to be addressed. The production and usage of technology contribute to surges in energy demand and the environmental impacts associated with the hardware life cycle. These concerns highlight the importance of considering the environmental implications of technology.

Collaboration between various sectors is deemed necessary to maximize the potential of technology in combating climate change. Governments, businesses, research institutions, and individuals are encouraged to collaborate and create incentives for sustainable practices and eco-friendly technologies. By working together, a more comprehensive and impactful approach to addressing climate change can be achieved.

The European Union’s twin transition approach, which combines green and digital strategies, is seen as a significant step towards battling climate change. The EU has committed to cutting its climate emissions by half by 2030 and aims to be climate neutral by 2050. This approach demonstrates the potential for combining digital advancements with environmental sustainability.

Transparency is highlighted as a crucial aspect in addressing the environmental impact of digitization. It is suggested that the lifecycle of applications, including design and conceptualization, should be accounted for, with measurement of material consumption carried out independently. Accessible and transparent results would allow for a better understanding of the environmental impact of digitization.

Circular economy principles are advocated as a means of reducing political dependence and promoting sustainability. The adoption of circular economy practices, such as recycling and resource conservation, can contribute to economic stability and security while reducing the negative impacts on the environment.

Equitable access to digital tools is emphasized as a necessary step towards addressing climate change. It is crucial to ensure that all population groups, including older people and structurally discriminated groups, have equal access to digital resources. Additionally, increasing digital sovereignty, which involves individuals having control over their own data, is seen as a crucial aspect of empowering individuals in the digital age.

Implementing technology solutions to combat climate change can be challenging, particularly in regions with a lack of infrastructure, high costs, and a lack of knowledge. These challenges highlight the need for targeted support and investment in these areas to overcome barriers and enable technology adoption for climate action.

Accountability and compliance regarding environmental laws and technology are critical to ensuring that technology initiatives are aligned with sustainability goals. The session raises concerns about the difficulty in ensuring compliance with environmental laws and court sentences. It suggests that supervision bodies and legal systems need to be strengthened to address these issues effectively.

Efforts from all sectors – including the private sector, academia, the tech community, the United Nations, and governments – are called for to find cheaper technology solutions to fight climate change and overcome existing challenges.

The preservation of biodiversity is mentioned as an important consideration in the context of climate change. The threat posed to the Brazilian biome due to temperature increases is highlighted, calling for urgent action to preserve ecosystems and biodiversity.

The power and influence of big tech companies are also scrutinized, particularly regarding the exploitation of data and resources of local citizens. International organizations are urged to work towards curbing the excessive power of big tech companies and preserving the interests of local communities.

Transparency and consumer awareness are seen as essential elements in promoting responsible behaviors in the digital age. It is suggested that if consumers were made aware of the impacts of data centers or unethical data practices, they might change their behaviors and support more sustainable practices.

Standards are recognized as crucial in promoting sustainable digitalization. The European strategy for green digitalization includes the implementation of standards to ensure that digitization aligns with sustainability goals. However, it is acknowledged that standardization bodies should strive for inclusivity and representation, ensuring that all stakeholders can contribute to the development of these standards.

Credibility issues associated with climate change reports are mentioned, indicating the need for effective checks and measures. It is essential that reports on climate change are credible and reliable to guide decision-making and demonstrate progress towards climate goals.

Lastly, the importance of legal and political collaboration is highlighted. It is noted that successful examples exist when politicians and legal teams worked together in areas such as patents and biodiversity aspects. It is emphasized that international agreements and disputes cannot be resolved solely through legal means, requiring the active involvement of politicians.

In conclusion, addressing climate change through technology requires immediate action and collaboration across various sectors. While technology offers potential solutions, responsible usage, transparency, and equitable access must be prioritized. The session highlights the role of young people, artificial intelligence, and circular economy principles in combating climate change. Challenges related to implementing technology solutions, accountability, and the preservation of biodiversity are also recognized. The excessive power of big tech companies, the importance of transparency and standards, and the need for legal and political collaboration are additional considerations in the fight against climate change.

João Vitor Andrade

The provided data highlights the potential of the internet and technology in addressing the global challenge of climate change. The arguments put forward are that these tools can play a crucial role in combating climate change by enabling innovative solutions, facilitating information sharing, and promoting sustainable practices.

One argument suggests that the internet and technology can enable innovative solutions by using artificial intelligence and improved sensors to collect real-time environmental data, such as deforestation, temperature, and air quality. This data can help identify strategies to mitigate climate change.

The importance of information sharing facilitated by the internet and technology is also emphasized. Rapid dissemination of knowledge and best practices can enable individuals, organizations, and governments to make informed decisions and take appropriate action in the fight against climate change.

Technology is also seen as a means to promote sustainable practices. Smart grid technologies, for example, can optimize energy distribution and consumption, reducing waste and making energy systems more efficient and environmentally friendly.

The internet and technology are recognized for their potential to reduce greenhouse gas emissions through virtual meetings and remote work, reducing the need for commuting and business travel. This can lead to a reduction in carbon emissions.

Precision agriculture technologies are also highlighted as important tools in the fight against climate change. These technologies can optimize crop production while reducing the use of water, fertilizers, and pesticides, contributing to reduced greenhouse gas emissions.

Stakeholder collaboration is emphasized as crucial in leveraging the potential of the internet and technology in addressing climate change. Collaboration between governments, businesses, NGOs, and individuals can maximize the impact of internet and technology-based solutions.

In addition, the analysis includes a neutral stance on climate change, suggesting that it is a problem for humans rather than the world. This highlights the need for increased awareness and understanding of the interconnectedness of climate change and its global impact.

There is also a call to rethink the system for distributing energy, focusing on efficiency rather than just production. The use of artificial intelligence to distribute energy efficiently to areas with higher or lower consumption is proposed as a solution for reducing wastage and promoting affordable and clean energy.

Lastly, there is a negative view expressed against the extensive use of fossil fuels in energy production. The contribution of countries like China, with significant coal-based energy production, to higher carbon emissions is highlighted. This underscores the importance of transitioning to cleaner and more sustainable energy sources.

Overall, the data highlights the potential and importance of internet and technology in addressing climate change. Collaboration, innovation, and sustainable practices are emphasized as key to effectively mitigating climate change and creating a more sustainable future.

Igor José Da Silva Araújo

Climate change is a pressing issue of global concern that requires urgent attention. It poses a significant threat to our planet, as evidenced by extreme weather events, changes in rainfall patterns, and rising temperatures. Human behaviour plays a pivotal role in the origin of climate change, with activities such as burning fossil fuels and deforestation contributing to greenhouse gas emissions. Acknowledging the impact of human behaviour is crucial in developing effective strategies to combat climate change.

Technology plays a crucial role in the fight against climate change. Renewable energy sources, such as wind, solar, and hydropower, offer sustainable alternatives to fossil fuels, reducing greenhouse gas emissions and promoting long-term sustainability. Adaptive practices, such as cultivating drought-resistant crops and implementing early warning systems, help communities respond proactively to the adverse effects of climate change.

Taking responsibility and acting now are essential to finding effective solutions to climate change. By doing so, we can mitigate its threats and safeguard the well-being of our planet and future generations. It is imperative that we adopt sustainable practices and utilise technology as allies in combating climate change. By addressing our actions and pursuing resilient solutions, we can make a positive impact and ensure a sustainable future for all.

Rosanna Fanni

The analysis highlights several key points regarding sustainable digitalisation. The first major point emphasises the need for better transparency and assessment of the environmental impact of digitisation. The report suggests that there is a lack of systematic data on the environmental impact, particularly throughout the lifecycle of digitisation. To address this, independent measurements and the accessibility of results are required. This would enable a more comprehensive understanding of the environmental footprint of digital technologies and help to identify areas for improvement.

Another important aspect identified in the analysis is the promotion of more entrepreneurial thinking and a compliance culture in relation to environmental sustainability. The argument is that creating environments where sustainability is viewed as an opportunity rather than a hurdle can drive innovation and economic growth. Furthermore, educational programs and awareness initiatives are seen as essential for fostering a culture of sustainability and ensuring that individuals are well-informed about the importance of sustainable practices.

The analysis also emphasises the need for a legal commitment to sustainability by design and default. This implies that ecological sustainability should be integrated into the design process of digital technologies, and the impact of these technologies should be visible to users. By making sustainability a legal requirement, companies will be compelled to consider the environmental consequences of their products and services, leading to more sustainable outcomes.

The circular economy approach is advocated for dealing with critical raw materials. Efforts should be made to reduce political dependence on countries with large raw material deposits. Moreover, the expansion of recycling practices can contribute to reducing the demand for new raw materials. This circular economy approach is seen as central to ensuring the long-term availability of critical raw materials and reducing their environmental impact.

Transparency and accountability in digital education, particularly with regards to artificial intelligence, is another important point raised in the analysis. Manufacturers are encouraged to provide clear explanations about how these technologies work and the implications they have. Additionally, special consideration should be given to children to ensure that they are prepared for the digital world and that their rights are protected.

The analysis also highlights the importance of equitable digital access for all, including older adults, children, and other structurally discriminated groups. Efforts to bridge the digital divide and ensure that everyone has equal opportunities to access digital technologies are crucial for promoting inclusivity and reducing inequalities.

Furthermore, the analysis suggests the need for increased digital sovereignty and the curbing of the power of big tech companies. It is argued that individuals should have control over their own data and decisions about its use. Additionally, educational initiatives are required to enhance media literacy and awareness, ensuring that individuals are empowered to navigate the digital landscape.

The analysis also highlights the significance of transparency in understanding the impact of big tech companies. More global reporting about tech companies is deemed necessary to inform consumers about their practices and allow them to make informed choices.

In terms of standards, the analysis stresses their importance in the strategy of European sustainable digitalisation. However, there are questions regarding how these standards are produced and whether inclusiveness is being prioritised. It is essential to ensure that standards are developed through a collaborative and inclusive process to guarantee their effectiveness and relevance.

Lastly, the analysis underscores the need for political prioritisation of green and sustainable digitalisation. Without political commitment and support, progress in these areas is unlikely to be achieved. Policy decisions and initiatives should prioritise environmental sustainability alongside digital transformation to ensure a sustainable and inclusive future.

In conclusion, the analysis highlights multiple crucial aspects of sustainable digitalisation. These include better transparency and assessment of the environmental impact, promoting entrepreneurial thinking and compliance culture, legal commitment to sustainability, circular economy practices, transparency and accountability in digital education, equitable digital access, increased digital sovereignty, curbing the power of big tech companies, transparency for consumers, the importance of standards, and political prioritisation of green and sustainable digitalisation. Emphasising and implementing these aspects will contribute to achieving a sustainable and inclusive digital future.

Denise Leal

The analysis covers a range of topics related to climate change, technology solutions, environmental law, biodiversity, ESG reports, and engagement between legal and political entities. One key issue highlighted is the lack of necessary infrastructure and knowledge in certain countries to successfully implement technology solutions. In Latin America and the Caribbean, for example, there is a significant deficit in infrastructure needed to support the implementation of these technologies. Moreover, technology solutions are often expensive, making them inaccessible to many people, and there is also a lack of knowledge and skills needed to effectively work with these technologies. This poses a significant challenge in achieving the Sustainable Development Goals (SDGs) related to industry, innovation, infrastructure, and climate action.

Another argument put forth is the need for cheaper technology solutions to combat climate change. The analysis suggests that there are countries that cannot afford expensive technology solutions, and therefore, more effort should be focused on developing and making available affordable alternatives. This would enable broader adoption of these solutions, fostering real progress in addressing climate change and achieving the SDGs.

The analysis also sheds light on the difficulties in ensuring compliance with environmental protection rulings. One of the main challenges identified is the lack of adequate supervisory bodies to effectively monitor and enforce compliance with these laws. Supervisory bodies are often small and insufficiently resourced, hampering their ability to carry out proper supervision. This raises concerns about the overall accountability and compliance of environmental laws, which is crucial in safeguarding the environment and achieving peace, justice, and strong institutions.

The negative impacts of climate change on biodiversity and species extinction are also emphasized in the analysis. It is highlighted that a significant portion of the Cerrado, a Brazilian biome, is projected to be lost due to climate change, resulting in the potential extinction of various species. Additionally, the analysis suggests that climate change has already caused some species to become extinct worldwide. These findings underscore the urgent need for action to mitigate the effects of climate change and protect biodiversity in order to achieve the SDGs related to life on land.

Regarding ESG (Environmental, Social, and Governance) reports, the analysis raises concerns about their authenticity due to potential inaccuracies and lack of a foolproof verification system. While standards and checks are in place for these reports, there is a notable absence of an efficient method to confirm their truthfulness. This challenges the reliability of ESG reports and calls for improved verification systems to ensure transparency and accountability in responsible consumption and production, as well as climate action.

The analysis also highlights the importance of collaboration between legal and political entities for effective resolutions. Successful examples of politicians and lawyers working together on patents and biodiversity issues are cited, underscoring the need for political and legal teams to align their efforts. This collaborative approach is crucial in achieving the SDGs related to peace, justice, and strong institutions.

Lastly, the analysis acknowledges the value of traditional communities’ successful environmental protection methods. The recognition of their effective methods highlights the importance of incorporating indigenous and traditional knowledge systems in environmental conservation efforts. This insight can contribute to achieving the SDGs related to life on land and underscores the need for respecting and valuing diverse approaches to environmental protection.

In conclusion, the analysis highlights several key challenges and recommendations related to climate change, technology solutions, environmental law, biodiversity, ESG reports, and engagement between legal and political entities. It underscores the importance of addressing these issues to achieve the SDGs and calls for collaboration, accountability, and the incorporation of diverse perspectives in environmental and sustainable development efforts.

Speaker

Artificial Intelligence (AI) has the potential to play a significant role in understanding climate change and mitigating its effects. It can optimize electricity supply and demand, reducing energy waste and greenhouse gas emissions. Furthermore, AI can enhance energy management systems, leading to more efficient resource utilization and a shift towards renewable energy sources. It also enables the development of early warning systems for severe weather events, improving preparedness and response efforts.

AI’s ability to provide accurate climate forecasts and predictions is another key advantage. By analyzing large amounts of data, AI algorithms can identify patterns and trends, allowing for more reliable projections of climate changes. Additionally, AI can predict crop yields and determine suitable locations for planting, contributing to stable food supply despite changing climatic conditions.

However, it is important to recognize the negative environmental impacts of technology proliferation. Rapid advancements in electronic devices and their shorter lifespan contribute to the growing problem of electronic waste (e-waste). Manufacturing electronic components is energy-intensive and water-dependent, and improper disposal of e-waste can have harmful consequences for both the environment and human health.

Therefore, it is crucial to use technology responsibly and consider both its positive and negative impacts. Responsible consumption and production of technology should be prioritised, considering environmental implications throughout the product lifecycle. This includes implementing policies and regulations to reduce e-waste generation, promoting recycling and proper disposal methods, and encouraging the development of sustainable and eco-friendly technologies.

Furthermore, leveraging AI to rethink energy usage and improve energy distribution is essential for achieving a sustainable future. By utilizing AI algorithms and advanced analytics, countries can optimize energy distribution networks, making them more efficient and reliable. This can lead to a significant reduction in energy waste and contribute to the goal of affordable and clean energy for all.

To address the global e-waste issue, urgent actions and strong policies are necessary. This involves engaging communities and giving them a voice in policy implementation and necessary actions. Collaborative efforts between governments, industry stakeholders, and individuals are crucial to effectively tackle e-waste and promote responsible consumption and production practices.

In summary, while AI offers promising solutions for understanding and mitigating climate change, it is essential to approach technology with a balanced perspective. Utilizing AI in energy management, climate forecasting, and agriculture can yield significant environmental benefits. However, negative impacts associated with technology proliferation, such as increased energy demand and e-waste, must be addressed through responsible consumption and production practices. With urgent actions, strong policies, and community engagement, AI and technology can be harnessed to create a more sustainable future.

James Amattey

Technology undoubtedly offers numerous benefits to society, but it also has a negative impact on climate change. The staggering number of devices globally, over 6.2 billion, each equipped with two or more chips that require frequent charging, contributes to significant energy consumption. These devices, such as smartphones and laptops, perform high computational tasks that demand substantial amounts of power, resulting in increased energy consumption and carbon emissions. Despite the transition to USB-C, a more energy-efficient charging technology, concerns over energy consumption persist.

Furthermore, the worldwide Cloud infrastructure for apps adds to the energy demands. Cloud servers, responsible for hosting and processing data for various applications, consume a significant amount of electricity. This consumption originates from the need to power and cool extensive server networks required to handle the vast amount of user-generated data. As our reliance on cloud-based services continues to grow, so does the strain on energy resources and the subsequent environmental impact.

Moreover, electric and autonomous mobility, hailed as a solution to curb fuel emissions, present a new set of energy challenges. Surprisingly, the computational power required to move an electric or autonomous vehicle exceeds that of conventional vehicles running on fuel. This increased computational power demands a substantial amount of electricity to power the intricate systems that enable electric and autonomous mobility.

To address the rising energy demands of electric vehicles (EVs), national-level policy adjustments are necessary. Expanding the charging infrastructure and implementing mechanisms to seamlessly integrate EVs into transportation systems are vital. Governments can play a vital role by providing incentives and support to encourage the adoption of electric vehicles, laying the foundation for a sustainable future.

In conclusion, while technology brings numerous benefits to society, it also poses challenges concerning climate change. The widespread use of devices and the energy demands of cloud infrastructure significantly contribute to energy consumption and carbon emissions. Furthermore, electric and autonomous mobility introduce new energy challenges that require careful consideration. Policymakers and industry leaders must collaborate to balance technological advancements with environmental sustainability, finding innovative solutions to mitigate the negative impact of technology on climate change.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Current Developments in DNS Privacy | IGF 2023

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

David Huberman

The summary emphasises the importance of DNS privacy, as DNS queries can reveal personal information about individuals. The clear text nature of DNS data until a few years ago made it accessible to anyone. This highlights the urgent need for developing protocols that ensure DNS privacy. The DNS was created in 1983, but privacy-focused developments only began in the last five to six years.

Paul Makapetris, the inventor of DNS, is credited for solving significant issues regarding the scaling and knowledge of all hosts on the internet. Prior to DNS, existing processes were unable to scale effectively. The creation of a distributed system through DNS enabled anyone to access information about hosts and their corresponding IP addresses, greatly enhancing the functionality and efficiency of the internet.

Jeff Houston, the chief scientist of APNIC, is regarded as a highly respected authority in the field of internet engineering. His deep understanding of the internet and its engineering aspects is acknowledged by David Huberman. As a thought leader, Jeff Houston is considered one of the best sources for discussing technical considerations related to DNS privacy.

In conclusion, DNS privacy is crucial due to the potential exposure of personal information through DNS queries. The delay in developing protocols for DNS privacy is seen as a missed opportunity, considering the long history of DNS and the recent start of privacy-focused developments. The invention of DNS by Paul Makapetris is credited for resolving critical issues associated with scaling and knowledge of internet hosts. Overall, Jeff Houston’s expertise in internet engineering is seen as valuable for discussions on the technical considerations of DNS privacy.

Geoff Huston

DNS privacy is an incredibly important issue, as DNS queries can track online activities, and if someone sees your DNS queries in real time, they essentially have access to all your secrets. Manipulations of DNS queries are also possible, as applications believe the first answer they receive. However, the DNS industry has made positive strides towards improving DNS privacy and security. Efforts such as query name minimisation and implementing encryption protocols like HTTPS and QUIC are being employed to protect DNS transactions. Despite these advancements, there is a challenge in balancing the need for an efficient network with the need for privacy in the DNS. Additionally, the technical community is working towards an opaque system that removes attributions in name use, but this may lead to a loss of transparency. The role of ICANN in DNS privacy is uncertain, and applications have gained control over the DNS, leaving traditional infrastructure operators behind. This shift towards application-driven technologies presents challenges for infrastructure operators. Overall, DNS privacy is a critical concern, and while improvements are being made, there are still challenges to address.

Manal Ismail

The European General Data Protection Regulation (GDPR) has had a significant impact on the GTLD Whois landscape. It mandates the reduction of personally identifiable information in registration data, radically changing the landscape. However, implementation of GDPR varies depending on the registry or registrar involved, resulting in a fragmented system. This has introduced several key issues, including increased ambiguity regarding the differentiation between legal and natural persons.

To address these challenges, there is a pressing need for standardized regulations and mechanisms for accessing non-public registration data and responding to urgent requests. However, reaching an agreement on the necessary policy recommendations has proven difficult. For example, the Governmental Advisory Committee (GAC) has found the proposed three-business-day timeline for responding to urgent requests unreasonable.

Another challenge arises from the lack of policy applicable to domain registrations subject to privacy proxy services. The use of privacy proxy protection has increased over time, and governments within the GAC are unsure of how to address this issue. The absence of clear policies in this regard makes it difficult to ensure compliance and protect privacy rights.

Improving the accuracy of GTLD registration data is a prioritized area of work. The GAC principles place great importance on the accuracy of this data, and ICANN is preparing a comprehensive assessment of the activities it may undertake to study accuracy obligations in light of applicable data protection laws and contractual authority.

During discussions, Manal Ismail expressed agreement with Steve and Farzi regarding the significance of data collected during the proof of concept. This demonstrates the recognition of the value of such data in informing decision-making and shaping policies.

Moreover, Manal Ismail believes in the necessity of constructive and inclusive discussions within ICANN’s bottom-up multi-stakeholder model. Despite diverse views, all participants were observed speaking from a public interest perspective. This highlights the importance of finding a balance between privacy and safety while considering the broader societal impact of ICANN’s decisions.

In conclusion, the GDPR has brought about significant changes in GTLD Whois records, necessitating the need for standardized regulations and mechanisms for accessing registration data and addressing urgent requests. The lack of policies applicable to domain registrations with privacy proxy services poses additional challenges. Efforts are being made to improve the accuracy of registration data. It is crucial to recognize the value of collected data during the proof of concept and engage in constructive and inclusive discussions to strike a balance between privacy and safety within ICANN’s bottom-up multi-stakeholder model.

Audience

During the ICANN62 Policy Forum, discussions on data privacy and access covered several crucial points. One speaker highlighted the potential harm caused by publicly accessible personal data of domain name registrants. For 20 years, this sensitive information, including mailing addresses, phone numbers, and email addresses, was available to the public. This raised concerns regarding the potential risks and harm that could arise from such unrestricted access to personal data.

On the positive side, another speaker mentioned the improvement brought by the advent of privacy proxies. This development allowed for increased privacy protection by masking personal information in domain registrations. This was seen as a step in the right direction towards improving domain privacy.

The forum also acknowledged and appreciated ICANN’s focus on DNS privacy. In one of the workshops, ICANN specifically titled it as DNS privacy and emphasized the importance of privacy in addition to access. This recognition highlighted the commitment to address privacy concerns and protect the data of internet users.

Transparency and accountability regarding law enforcement’s access to people’s data were deemed important. It was stressed that governments and law enforcement agencies should be transparent in their requests for access. This would ensure that there are clear processes in place for requesting and granting access to personal data, minimizing the potential for misuse or abuse.

Concerns were raised about the implementation of metrics for requester’s access, particularly when the requesters are from authoritarian countries. Questions were posed regarding the accessibility of data to law enforcement in such countries and the verification process to ensure compliance with ethical standards. These concerns emphasized the need for a robust system that prevents unauthorized access to personal information.

The audience also expressed the need for clarification on who has access to the data and how it is granted. This highlighted the importance of defining and understanding access privileges to ensure that data is only accessed by authorized entities and for legitimate reasons.

The adoption of the Registration Data Access Protocol (RDAP) was seen as a positive development. RDAP is a standardized protocol aimed at improving data access and security in domain registrations. However, concerns were raised regarding data privacy and security under the new protocol. The example of Indonesia was mentioned, where a local law prohibits the disclosure of data, even for legitimate law enforcement interests. This highlighted the challenges of reconciling different data protection regulations and ensuring compliance.

Data ownership was emphasized as a fundamental aspect of data protection and privacy discussions. Registrars were highlighted as having an obligation to comply with the data protection laws of the country whose residents’ data they hold. With potential obligations under multiple data protection laws based on the nationality of residents, the need for clarity and understanding of data ownership became crucial.

The forum also recognized the importance of ICANN, IETF, and IANA in addressing DNS privacy and developing policies. There was an expectation for these organizations to be actively involved in considering the costs and benefits of potential tools and providing guidance on DNS privacy.

Regarding Request Distribution Reporting System (RDRS), concerns were raised about its adequacy as a measure of demand. The need for improvements, such as the ability to allow bulk uploading of requests and retaining requester data for analysis, was suggested. It was proposed to hire a privacy lawyer for an in-depth review to ensure the system’s effectiveness.

The uncertainty of registrar participation in RDRS and its potential impact on requesters’ engagement was highlighted. It was remarked that promises on the operation of RDRS could not be successfully delivered due to the unknown number of participating registrars. A negative initial experience discouraging further engagement was also mentioned as a potential consequence.

Suggestions were made to retain data for evaluation purposes to provide an incentive for requesters to continue participating, despite potential initial disappointments. The low submission of requests indicated that some requesters might be tackling the issue without relying on data, but the importance of data retention for downstream analytics was emphasized.

Making participation in the Expansive Secure Synchronized Access and Disclosure (ESSAD) program mandatory was seen as beneficial. It was recognized that ESSAD could potentially serve as a valuable resource for data gathering and enhance the effectiveness of data access and disclosure.

ICANN’s participation in discussions on DNS abuse was mentioned, indicating a commitment to address and mitigate abuse issues in the domain name system. This participation demonstrated the recognition of the importance of maintaining a secure and abuse-free online ecosystem.

The lack of uptake of encrypted DNS, DNSSEC, and other protocols was highlighted, raising concerns about the security of the internet infrastructure. The need for end-user involvement in the design and implementation of standards was emphasized to ensure better adoption and implementation.

Lastly, the importance of not compromising enterprise cybersecurity through the “going dark” phenomenon was emphasized. Privacy was viewed as deluded without security, and it was emphasized that removing all data without ensuring proper security measures would lead to a worse privacy condition than before.

In conclusion, the discussion at the ICANN62 Policy Forum highlighted the necessity of addressing data privacy concerns while ensuring responsible data access. It underscored the importance of transparency, accountability, and clarity in the process of granting data access, especially for law enforcement agencies. The adoption of protocols such as RDAP and ESSAD were seen as positive steps towards improving data privacy and access. However, concerns regarding privacy, security, and the participation and effectiveness of various systems were also raised, emphasizing the need for continuous improvement and collaboration among stakeholders to ensure a secure and privacy-focused internet ecosystem.

Becky Burr

The discussion revolves around the need to protect privacy in the Domain Name System (DNS), particularly with regards to WHOIS data. WHOIS data contains information about the registrant of a domain name, and access to this data can potentially be misused for phishing, fraud, and suppressing free expression.

To ensure appropriate handling of data, it is important to adhere to fair information practice principles, which include principles of lawfulness, fairness, transparency, and accountability. These principles should guide the way data is dealt with in the DNS.

One notable development in 2018 was when WHOIS data went offline and became accessible only upon request. This change was made to provide better accountability and protection of privacy in the DNS ecosystem.

While ICANN (Internet Corporation for Assigned Names and Numbers) plays a role in supporting and facilitating registrars in their data processing responsibilities, it cannot dictate the outcome of the balancing test that registrars must perform when determining the accessibility of data. The responsibility for data processing lies with the respective registrars.

Queries associated with an IP address can provide information about individual and institutional internet uses. However, it is argued that not all queries associated with an IP address should be public. The public nature of the DNS is essential for resolving queries, but privacy considerations should also be taken into account.

Registrars, who hold the data, make decisions about the release of data based on a variety of circumstances. These decisions are informed by the relevant laws, regulations, and the registrars’ own company policies. The release of data should consider legitimate interests and the privacy rights of the individuals involved.

Data ownership is a complex issue that is fundamental to the discussion of data protection and privacy. Modern data protection laws apply not just to processing data within a country but also to the information about residents of that country. When users register a domain name with a registrar, they agree to the registrar’s privacy policy. Additionally, the ICANN contract requires registrars to make certain disclosures.

Compliance with the law is crucial for registrars. Even if registrars are located outside a particular country, they may have obligations under the law of the country where the resident whose information they hold is located. Therefore, registrars must comply with the applicable laws and regulations governing the processing of data.

In terms of encouraging participation, it is suggested that collecting data for downstream analytics can serve as an incentive for registrars to participate. This data can offer valuable insights into the DNS ecosystem. There is even a suggestion to make participation mandatory for all registrars, as it is seen as important for the overall functioning and improvement of the system.

Finally, there is an acknowledgement of the importance of understanding the needs of requesters through the system. This understanding can help address any issues or concerns and improve the overall experience for all parties involved.

In conclusion, the discussion highlights the importance of protecting privacy in the DNS, specifically in relation to WHOIS data. Fair information practice principles should guide appropriate data handling, and registrars are responsible for complying with relevant laws and regulations. Data ownership and privacy are complex issues that need to be considered in the context of data protection. Encouraging participation and understanding the needs of requesters are also essential for the effective functioning of the DNS ecosystem.

Yuko Yokoyama

ICANN (Internet Corporation for Assigned Names and Numbers) is developing a new service called RDRS (Registration Data Request Service), which aims to simplify the process of requesting non-public GTLD (Generic Top-Level Domain) registration data. RDRS will act as a centralized platform for registrars to submit and receive data requests, benefiting stakeholders such as law enforcement agencies, IP attorneys, and cybersecurity professionals.

RDRS is a voluntary service and ICANN cannot force registrars to disclose data through this platform. The decision to disclose or not lies with the registrars, and RDRS operates as a proof of concept service for up to two years.

Key features of RDRS include the automated identification of domain managers, eliminating the need for requesters to identify them themselves. Additionally, requesters will have access to their past and pending requests within the system.

It is important to note that the disclosure of requested data is not guaranteed by RDRS. Each registrar conducts a balancing test before deciding whether to disclose data, taking into account local laws and other applicable regulations. This ensures compliance with legal regulations and protects individual privacy rights.

Only ICANN accredited registrars have access to the RDRS system. They act as intermediaries between requesters and the platform, holding the registration data and routing requests accordingly.

In summary, ICANN’s RDRS aims to streamline the process of requesting non-public GTLD registration data. It provides a central platform for registrars to submit and receive data requests, benefiting stakeholders such as law enforcement agencies, IP attorneys, and cybersecurity professionals. However, the decision to disclose data is ultimately up to the registrars, considering local laws and regulations. Only ICANN accredited registrars can use the RDRS system.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Can (generative) AI be compatible with Data Protection? | IGF 2023 #24

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Kamesh Shekar

The analysis examines the importance of principles and regulation in the field of artificial intelligence (AI). It highlights the need for a principle-based framework that operates at the ecosystem level, involving various stakeholders. The proposed framework suggests that responsibilities should be shared among different actors within the AI ecosystem to ensure safer and more responsible utilization of AI technologies. This approach is seen as crucial for fostering trust, transparency, and accountability in the AI domain.

Additionally, the analysis emphasizes the significance of consensus building in regard to AI principles. It argues for achieving clarity on principles that resonate with all stakeholders involved in AI development and deployment. International discussions are seen as a crucial step towards establishing a common understanding and consensus on AI principles, ensuring global alignment in the adoption of ethical and responsible practices.

Furthermore, the analysis explores the role of regulation in the AI landscape. It suggests that regulation should not only focus on compliance but also be market-oriented. The argument is made that enabling the AI market and providing businesses with a value proposition in regulation can support innovation while ensuring ethical and responsible AI practices. This market-based regulation approach is believed to be beneficial for industry growth (aligning with SDG 9: Industry, Innovation, and Infrastructure) and economic development (aligning with SDG 8: Decent Work and Economic Growth).

Overall, the sentiment towards implementing principles and regulation in AI is positive. Although the analysis does not provide specific principles or regulations, it emphasizes the importance of a principle-based framework, consensus building, and market-based regulation. These insights can be valuable for policymakers, industry leaders, and other stakeholders in developing effective and responsible AI governance strategies.

Jonathan Mendoza Iserte

Artificial intelligence (AI) has the potential to drive innovation across sectors, but it also poses challenges in terms of regulation, ethical use, and the need for transparency and accountability. The field of AI is rapidly evolving and has the capacity to transform development models in Latin America. Therefore, effective regulations are necessary to harness its benefits.

Latin American countries like Argentina, Brazil, and Mexico have taken steps towards AI regulation and have emerged as regional leaders in global AI discussions. To further strengthen regulation efforts, it is proposed to establish a dedicated mechanism in the form of a committee of experts in Latin America. This committee would shape policies and frameworks tailored to the region’s unique challenges and opportunities.

The adoption and implementation of AI will have mixed effects on the economy and labor. By 2030, AI is estimated to contribute around $13 trillion to the global economy. However, its impact on specific industries and job markets may vary. While AI can enhance productivity and create opportunities, it may also disrupt certain sectors and lead to job displacement. Policymakers and stakeholders need to consider these implications and implement measures to mitigate negative consequences.

Additionally, it is crucial for AI systems to respect fundamental human rights and avoid biases. A human-centric approach is necessary to ensure the ethical development and deployment of AI technologies. This includes safeguards against discriminatory algorithms and biases that could perpetuate inequalities or violate human rights.

In conclusion, AI presents both opportunities and challenges. Effective regulation is crucial to harness the potential benefits of AI in Latin America while mitigating potential harms. This requires international cooperation and a human-centric approach that prioritizes ethical use and respect for human rights. By navigating these issues carefully, Latin America can drive inclusive and sustainable development.

Moderator – Luca Belli

The analysis delves into various aspects of AI and Data Governance, shedding light on several important points. Firstly, it highlights the significance of comprehending AI sovereignty and its key enablers. AI sovereignty goes beyond authoritarian control or protectionism and involves understanding and regulating technologies. The enablers of AI sovereignty encompass multiple elements, including data, algorithms, computation, connectivity, cybersecurity, electrical power, capacity building, and risk-based AI governance frameworks. Understanding these enablers is crucial for effective AI and Data Governance.

Secondly, the analysis underscores the need to increase representation and consideration of ideas from the Global South in discussions about data governance and AI. The creation of the Data and AI Governance Coalition aims to address issues related to data governance and AI from the perspective of the Global South. It highlights the criticism that discussions often overlook ideas and solutions from this region. To achieve comprehensive and inclusive AI and Data Governance, it is imperative to involve diverse voices and perspectives from around the world.

Moreover, the analysis emphasizes that AI governance should be considered a fundamental right for everyone. It is mentioned in Article 1 of the United Nations Charter and the International Covenants on Political, Civil, Economic, Social, and Cultural Rights. Recognizing AI governance as a fundamental right ensures individuals possess agency and control over their own technological destiny.

Furthermore, the analysis notes that the development of an international regime on AI may take between seven and ten years. This estimate is influenced by the involvement of tech executives who advocate for such an agreement. Due to the complexity of AI and the multitude of considerations involved, reaching international consensus on an AI regime requires ample time for careful deliberation and collaboration.

Lastly, the examination reveals that the process of shaping the UN Convention on Artificial Intelligence could be protracted due to geopolitical conflicts and strategic competition. These external factors introduce additional challenges and intricacies into the negotiating process, potentially prolonging the time required to finalize the convention.

In conclusion, the analysis offers valuable insights into AI and Data Governance. It emphasizes the importance of understanding AI sovereignty and its enablers, advocates for increased representation from the Global South, asserts AI governance as a fundamental right, highlights the time-consuming nature of developing an international regime on AI, and acknowledges the potential delays caused by geopolitical conflicts and strategic competition. These findings contribute to a deeper understanding of the complexities surrounding AI and Data Governance and provide a foundation for informed decision-making in this domain.

Audience

The analysis explores various topics and arguments relating to the intersection of AI and data protection. One concern is whether generative AI is compatible with data protection, as it may pose challenges in safeguarding personal data. There is also an interest in understanding how AI intersects with nationality and statelessness, with potential implications for reducing inequalities and promoting peace and justice. Additionally, there is a desire to know if there are frameworks or successful instances of generative AI working in different regions.

Privacy principles within Gen-AI platforms are seen as crucial, with 17 initial principles identified and plans to test them with 50 use cases. However, the use of AI also raises questions about certain data protection principles, as generative AI systems may lack specified purposes and predominantly work with non-personal data for profiling individuals.

There is a call for a UN Convention on Artificial Intelligence to manage the risks and misuse of AI at an international level. However, the analysis does not provide further details or evidence on the feasibility or implementation of such a convention. Potential geopolitical conflicts and strategic competition between AI powers are also highlighted as potential barriers to developing a UN Convention on Artificial Intelligence.

The “Brussels effect” is mentioned as a factor that may have negative impacts in non-European contexts. Concerns are raised about premature legislation in the field of AI and the need for clear definitions when legislating on AI to ensure comprehensive regulation. The analysis covers a broad range of topics and arguments, though some lack supporting evidence or further exploration. Notable insights include the need for privacy principles in Gen-AI platforms, challenges to data protection principles posed by AI, and the potential hindrances to global cooperation on AI regulation.

In conclusion, the analysis offers valuable insights into the complex relationship between AI and data protection.

Giuseppe Claudio Cicu

Artificial intelligence (AI) is reshaping the corporate governance framework and business processes, revolutionizing society. Its integration is positive, as it enhances strategy setting, decision making, monitoring, and compliance in organisations. However, challenges arise in terms of transparency and accountability. To address this, an ethical approach to AI implementation is proposed, such as the AI by Corporate Design Framework, which blends business process management and the AI lifecycle. This framework incorporates ethical considerations like the human in the loop and human on the loop principles. Furthermore, it is suggested that corporations establish an Ethical Algorithmic Legal Committee to regulate AI applications. This committee would act as a filter between stakeholders and AI outputs, ensuring ethical decision-making. Additionally, there’s a call for legislators to recognise technology as a corporate dimension, as it has implications for accountability, organisation, and administration. By developing appropriate regulations and norms, responsible and ethical use of AI in corporate governance can be ensured. Overall, AI has potential benefits for corporate governance and business processes, but careful consideration of transparency, accountability, and ethics is necessary.

Armando José Manzueta-Peña

The use of generative AI holds great potential for the modernisation of government services and the improvement of citizens’ lives. By automating the migration of legacy software to flexible cloud-based applications, generative AI can supercharge digital modernisation in the government sector. This automation process can greatly streamline and enhance government operations. AI-powered tools can assist with pattern detection in large stores of data, enabling effective analysis and decision-making. The migration of certain technology systems to the cloud, coupled with AI infusion, opens up new possibilities for enhanced use of data in government services.

To successfully implement AI in the public sector, attention must be given to key areas. Firstly, existing public sector workers should receive training to effectively manage AI-related projects. Equipping government employees with the necessary skills and knowledge is essential. Citizen engagement should be prioritised when developing new services and modernising existing ones. Involving citizens in the decision-making process fosters inclusivity and builds trust. Government institutions must be seen as the most trusted entities holding and managing citizens’ data. Strong data protection rules and ethical considerations are crucial. Modernising the frameworks for data protection safeguards sensitive information and maintains public trust.

The quality of AI systems is heavily dependent on the quality of the data they are fed. Accurate data input is necessary to avoid inaccurate profiling of individuals or companies. Effective data management, collection, and validation policies are vital for meaningful outcomes. Strong data protection measures, collection, and validation processes ensure accurate and reliable AI-driven solutions. Developing nations face challenges in quality data collection, but good quality data and administrative registers are necessary to leverage AI effectively.

In conclusion, successful AI implementation in the public sector requires government institutions to familiarise themselves with the advantages of AI and generative AI. Workforce transformation, citizen engagement, and government platform modernisation are crucial areas. Strong data protection rules and ethical considerations are essential. The quality of AI systems relies on the quality of the data they are fed. Proper data management, collection, and validation policies are necessary. Addressing these aspects allows government institutions to harness the full potential of AI, modernise their services, and improve citizens’ lives.

Michael

The analysis examines the issue of harmonised standards in the context of AI and highlights potential shortcomings. It is argued that these standards might fail to consider the specific needs of diverse populations and the local contexts in which AI systems are implemented. This is concerning as it could result in AI systems that do not effectively address the challenges and requirements of different communities.

One of the reasons for this oversight is that the individuals involved in developing these standards primarily come from wealthier parts of the world. As a result, their perspectives may not adequately reflect the experiences and concerns of marginalised communities who are most impacted by AI technologies.

While some proponents argue that harmonised standards can be beneficial and efficient, it is stressed that they should not disregard the individual needs and concerns of diverse populations. Balancing the efficiency and standardisation of AI systems with the consideration of local contexts and marginalised populations’ needs is paramount.

The tension between the value of harmonised AI standards and the disregard for local contexts is noted. It is suggested that the development of these standards may further entrench global inequities by perpetuating existing power imbalances and neglecting the specific challenges faced by different communities.

In conclusion, the analysis cautions against the potential pitfalls of harmonised AI standards that do not take into account diverse populations and local contexts. While harmonisation can be beneficial, it should not be at the expense of addressing the specific needs and concerns of marginalised communities. By striking a balance between efficiency and inclusivity, AI standards can better serve the needs of all communities and avoid perpetuating global inequities.

Kazim Rizvi

In his paper, Kazim Rezvi delved into the important topic of mapping and operationalising trustworthy AI principles in specific sectors, focusing specifically on finance and healthcare. He discussed the need for responsible implementation and ethical direction in the field of AI, highlighting the potential synergies and conflicts that may arise when applying these principles in these sectors. To address this, Rezvi proposed a two-layer approach to AI, dividing it into non-technical and technical aspects.

The non-technical layer examines strategies for responsible implementation and ethical direction. This involves exploring various approaches to ensure that AI technologies are developed and deployed in a manner that upholds ethical standards and benefits society as a whole. Rezvi emphasised the importance of involving multiple stakeholders from industry, civil society, academia, and government in this process. By collaborating and sharing insights, these diverse stakeholders can contribute to the effective implementation of AI principles in their respective domains.

In addition to the non-technical layer, the technical layer focuses on different implementation strategies for AI. This encompasses the technical aspects of AI development, such as algorithms and models. Rezvi emphasised the need for careful consideration and evaluation of these strategies to align them with trustworthy AI principles.

Moreover, Rezvi highlighted the significance of a multi-stakeholder approach for mapping and operationalising AI principles. By involving various stakeholders, including those from industry, civil society, academia, and government, a more comprehensive understanding of the challenges and opportunities associated with AI can be gained. This approach fosters partnerships and collaborations that can lead to effective implementation of AI principles in relevant domains.

Rezvi also discussed the need for coordination of domestic laws and international regulations for AI. He pointed out that currently there is no specific legal framework governing AI in India, which underscores the importance of harmonising laws in the context of AI. This coordination should take into account existing internet laws and any upcoming legislation to ensure a comprehensive and effective regulatory framework for AI.

Furthermore, Rezvi explored alternative regulatory approaches for AI, such as market mechanisms, public-private partnerships, and consumer protection for developers. While not providing specific supporting facts for these approaches, Rezvi acknowledged their potential in enhancing the regulation of AI and ensuring ethical practices and responsible innovation.

In conclusion, Kazim Rezvi’s paper presented an in-depth analysis of the mapping and operationalisation of trustworthy AI principles in the finance and healthcare sectors. He highlighted the need for a multi-stakeholder approach, coordination of domestic laws and international regulations, as well as alternative regulatory approaches for AI. By addressing these issues, Rezvi argued for the responsible and ethical implementation of AI, ultimately promoting the well-being of society and the achievement of sustainable development goals.

Wei Wang

The discussion centres around the regulation of Artificial Intelligence (AI) across different jurisdictions, with a particular focus on Asia, the US, and China. Overall, there is a cautious approach to regulating AI, with an emphasis on implementing ethical frameworks and taking small, precise regulatory steps. Singapore, for instance, recognises the importance of adopting existing global frameworks to guide their AI regulation efforts.

In terms of specific regulatory models, there is an evolution happening, with a greater emphasis on legal accountability, consumer protection, and the principle of accountability. The US has proposed a bipartisan framework for AI regulation, while China has introduced a model law that includes the principle of accountability. Both of these frameworks aim to ensure that AI systems and their designers are responsible and held accountable for any negative consequences that may arise.

However, one lingering challenge in AI regulation is finding the right balance between adaptability and regulatory predictability. It is vital to strike a balance that allows for innovation and growth while still providing effective governance and oversight. Achieving this equilibrium is essential to ensure that AI technologies and applications are developed and used responsibly.

The need for effective governance and regulation of AI is further emphasized by the requirement for a long-standing balance. AI is a rapidly evolving field, and regulations must be flexible enough to keep up with advancements and emerging challenges. At the same time, there is a need for regulatory predictability to provide stability and ensure that ethical and responsible AI practices are followed consistently.

In conclusion, the conversation highlights the cautious yet evolving approach to AI regulation in various jurisdictions. The focus is on implementing ethical frameworks, legal accountability, and consumer protection. Striking a balance between adaptability and regulatory predictability is essential for effective governance of AI. Ongoing efforts are required to develop robust and flexible regulatory frameworks that can keep pace with the rapid advancements in AI technology and applications.

Smriti Parsheera

Transparency in AI is essential, and it should apply throughout the entire life cycle of a project. This includes policy transparency, which involves making the rules and guidelines governing AI systems clear and accessible. Technical transparency ensures that the inner workings of AI algorithms and models are transparent, enabling better understanding and scrutiny. Operational and organizational transparency ensures that the processes and decisions made during the project are open to scrutiny and accountability. These three layers of transparency work together to promote trust and accountability in AI systems.

Another crucial aspect where transparency is needed is in publicly facing facial recognition systems. These systems, particularly those used in locations such as airports, demand even greater transparency. This goes beyond simply providing information and requires a more deliberate approach to transparency. A case study of a facial recognition system for airport entry highlights the importance of transparency in establishing public trust and understanding of the technology.

Transparency is not limited to the private sector. Entities outside of the private sector, such as philanthropies, think tanks, and consultants, also need to uphold transparency. It is crucial for these organizations to be transparent about their operations, relationships with the government, and the influence they wield. Applying the right to information laws to these entities ensures that transparency is maintained and that they are held accountable for their actions.

In conclusion, transparency is a key factor in various aspects of AI and the organizations involved in its development and implementation. It encompasses policy, technical, and operational transparency, which ensure a clear understanding of AI systems. Publicly facing facial recognition systems require even higher levels of transparency to earn public trust. Additionally, entities outside of the private sector need to be transparent and subject to right to information laws to maintain accountability. By promoting transparency, we can foster trust, accountability, and responsible development of AI systems.

Gbenga Sesan

The analysis highlights the necessity of reviewing data protection policies to adequately address the extensive data collection activities of AI. It points out that although data protection regimes exist in many countries, they may not have considered the scope of AI’s data needs. The delayed ratification of the Malabo Convention further underscores the urgency to review these policies.

Another key argument presented in the analysis is the centrality of people in AI discourse and practice. It asserts that people, as data owners, are fundamental to the functioning of AI. AI systems should be modelled to encompass diversity, not just for tokenism, but to ensure a comprehensive understanding of context and to prevent harm. By doing so, we can work towards achieving reduced inequalities and gender equality.

The analysis also underscores the need for practical support for individuals when AI makes mistakes or causes problems. It raises pertinent questions about the necessary steps to be taken and the appropriate entities to engage with in order to address such issues. It suggests that independent Data Protection Commissions could provide the requisite support to individuals affected by AI-related concerns.

Additionally, the analysis voices criticism regarding AI’s opacity and the challenges faced in obtaining redress when errors occur. The negative sentiment is supported by a personal experience where an AI system wrongly attributed information about the speaker’s academic achievements and professional appointments. This highlights the imperative of transparency and accountability in AI systems.

Overall, the analysis emphasises the need to review data protection policies, foreground people in AI discourse, provide practical support, and address concerns regarding AI’s opacity. It underscores the significance of transparency and accountability in ensuring responsible development and deployment of AI technologies. These insights align with the goals of advancing industry, innovation, and infrastructure, as well as promoting peace, justice, and strong institutions.

Melody Musoni

The analysis explores the development of AI in South Africa as a means to address African problems. It emphasizes the significance of policy frameworks and computing infrastructures at the African Union level, which emphasise the message that AI can be used to tackle specific challenges that are unique to Africa. The availability of reliable computing infrastructures is deemed crucial for the advancement of AI technology.

Furthermore, the analysis delves into South Africa’s efforts to improve its computational capacity and data centres. It mentions that South Africa aspires to be a hub for hosting data for other African countries. To achieve this goal, the government is collaborating with private companies such as Microsoft and Amazon to establish data centres. This highlights South Africa’s commitment to bolstering its technological infrastructure and harnessing the potential of AI.

The discussion also highlights South Africa’s dedication to AI skills development, with a particular focus on STEM and AI-related subjects in primary schools through to university levels. This commitment emphasises the need to provide quality education and equip the younger generation with the necessary skills to drive innovation and keep up with global advancements in AI technology.

However, it is also stressed that careful consideration must be given to data protection before implementing AI policies. The analysis asserts that existing legal frameworks surrounding data protection should be assessed before rushing into the establishment of AI policies or laws. This demonstrates the importance of safeguarding personal information and ensuring that data processing and profiling adhere to the principles of transparency, data minimisation, data subject rights, and campus limitation.

Moreover, the analysis sheds light on the challenges faced by South Africa in its AI development journey. These challenges include power outages that are expected to persist for a two-year period, a significant portion of the population lacking access to reliable connectivity, and the absence of a specific cybersecurity strategy. This underscores the importance of addressing these issues to create an environment conducive to AI development and implementation.

Additionally, the analysis points out that while data protection principles theoretically apply to generative AI, in practice, they are difficult to implement. This highlights the need for data regulators to acquire more technical knowledge on AI to effectively regulate and protect data in the context of AI technology.

In conclusion, the analysis provides insights into the various facets of AI development in South Africa. It emphasises the significance of policy frameworks, computing infrastructures, and AI skills development. It also highlights the need for prioritising data protection, addressing challenges related to power outages and connectivity, and enhancing regulatory knowledge on AI. These findings contribute to a better understanding of the current landscape and the potential for AI to solve African problems in South Africa.

Liisa Janssens

Liisa Janssens, a scientist working at the Dutch Applied Sciences Institute, believes that the combination of law, philosophy, and technology can enhance the application of good governance in artificial intelligence (AI). She views the rule of law as an essential aspect of good governance and applies this concept to AI. Liisa’s interdisciplinary approach has led to successful collaborations through scenario planning in military operations. By using scenarios as a problem focus for disciplines such as law, philosophy, and technology, Liisa has achieved commendable results during her seven-year tenure at the institute.

In addition, there is a suggestion to test new technical requirements for AI governance in real operational settings. These settings can include projects undertaken by NATO that utilize Digital Twins or actual real-world environments. Testing and assessing technical requirements in these contexts are crucial for understanding how AI can be effectively governed.

In summary, Liisa Janssens emphasizes the importance of combining law, philosophy, and technology to establish good governance in AI. She advocates for the application of the rule of law to AI. Liisa’s successful engagement in interdisciplinary collaboration through scenario planning highlights its effectiveness in fostering collaboration between different disciplines. The suggestion to test new technical requirements for AI governance in real operational environments provides opportunities for developing effective governance frameworks. Liisa’s insights and approaches contribute to advancing the understanding and application of good governance principles in AI.

Camila Leite Contri

AI technology has the potential to revolutionise various sectors, including finance, mobility, and healthcare, offering numerous opportunities for advancement. However, the rapid progress of innovation in AI often outpaces the speed at which regulation can be implemented, leading to challenges in adequately protecting consumer rights. The Consumer Law Initiative (CLI), a consumer organisation, aims to safeguard the rights of consumers against potential AI misuse.

In the AI market, there are concerns about the concentration of power and control in the hands of big tech companies and foreign entities. These companies dominate the market, resulting in inequality in AI technology access. Developing countries, particularly those in the global south, heavily rely on foreign technologies, exacerbating this issue.

To ensure the proper functioning of the AI ecosystem, it is crucial to uphold not only data protection laws but also consumer and competition laws. Compliance with these regulations helps ensure transparency, fair competition, and protection of consumer rights in AI development and deployment.

A specific case highlighting the need for data protection is the alleged infringement of data protection rights in Brazil in relation to ChatGPT. Concerns have been raised regarding issues such as access to personal data, clarity, and the identity of data controllers. The Brazilian Data Protection Authority has yet to make progress in addressing these concerns, emphasising the importance of robust data protection measures within the AI industry.

In conclusion, while AI presents significant opportunities for advancement, it also poses challenges that require attention. Regulation needs to catch up with the pace of innovation to adequately protect consumer rights. Additionally, addressing the concentration of power in big tech companies and foreign entities is crucial for creating a fair and inclusive AI market. Upholding data protection, consumer rights, and competition laws is vital for maintaining transparency, accountability, and safeguarding the interests of consumers and society as a whole.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Child online safety: Industry engagement and regulation | IGF 2023 Open Forum #58

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Julie Inman Grant

The analysis covered a range of topics related to online safety and abuse. One of the main points discussed was Australia’s strong online content scheme, which has been in place for over 22 years. The scheme is primarily extraterritorial, as almost all of the illegal content it deals with is hosted overseas. This highlights Australia’s commitment to tackling online content and ensuring a safe online environment for its citizens.

Another important aspect highlighted in the analysis is the need for a more individuals-centered approach in addressing online abuse. Schemes have been put in place to address individual abuse cases, and understanding current trends in online abuse is deemed integral to applying systemic powers effectively. Taking into account the experiences and needs of individuals affected by online abuse can lead to more targeted and effective interventions.

A concerning finding from the analysis is the significant increase in cases of online child sexual exploitation and sexual extortion. It is reported that there has been a doubling of child sexual exploitation cases and a tripling of sexual extortion reports. Shockingly, one in eight analyzed URLs involves coerced and self-produced abuse through smartphones and webcams. These figures highlight the urgent need for robust measures to combat online child sexual abuse and protect vulnerable children.

The role of online platforms in preventing abuse was also discussed. Currently, online platforms are being used as weapons for abuse. However, platforms like Snap and Instagram have been provided with intelligence reports on how to prevent this abuse. The analysis suggests that online platforms should do more to proactively guard against their services being exploited for abusive purposes.

The analysis also touched upon the topic of corporate responsibility in online safety. The introduction of the basic online safety expectations tool allows the government to ask transparency questions and compel legal answers from companies. Furthermore, companies can be fined based on their truthful and complete responses. These expectations play a pivotal role in compelling companies to operate safely and protect their users.

Global collaboration and transparency were identified as crucial factors in tackling online child abuse. Initiatives like the Heaton Initiative are putting pressure on large companies, such as Apple, to do more to address child sexual abuse. Additionally, future enforcement announcements targeted at five more countries are to be made next year, indicating the ongoing commitment to global collaboration in combating online child abuse.

The analysis also highlighted the challenges faced in safeguarding children online. While the internet has become an essential tool for children’s education, communication, and exploration, it was not initially built with children in mind. Notably, there has been a notable increase in reports of cyberbullying among younger children during COVID-19 lockdowns. It is imperative to strike a balance between safeguarding children appropriately and allowing them to benefit from the internet’s use.

Regarding age verification, the analysis presented differing viewpoints. Companies were encouraged to take responsibility in verifying users’ ages and facilitating meaningful checks. However, it was suggested that age verification should not restrict children’s access to necessary and beneficial content. Trials for age verification are currently being conducted by platforms like Roblox, and Tinder and Instagram have begun implementing age verification in Australia. However, there are concerns about the effectiveness and potential restrictions on access for marginalized communities.

The effectiveness of META’s Oversight Board in reviewing content moderation decisions was called into question. In the past year, the board received around 1.3 million requests for content moderation reviews but was only able to cover 12 cases. This raises concerns about the board’s efficiency in handling the sheer volume of cases.

Lastly, the analysis emphasized the importance of multinational regulation for online platforms and the need for specialized agencies to handle investigations. The gray area of regulation poses significant challenges, requiring multi-layered investigations to effectively address abuse and ensure accountability.

In conclusion, the analysis shed light on various aspects of online safety and abuse. It highlighted Australia’s strong online content scheme, the need for individuals-centered approaches in tackling online abuse, the concerning increase in cases of online child sexual exploitation, and the role of online platforms in preventing abuse. The importance of global collaboration, corporate responsibility, and safeguarding children online was also emphasized. Critical evaluations were made regarding age verification measures, META’s Oversight Board, and the need for multinational regulation and specialized agencies. These insights provide valuable information for policymakers, platforms, and organizations to address online safety and combat abuse effectively.

Audience

The discussion revolves around striking a balance between children’s right to access information online and ensuring their safety, particularly in relation to sexuality education. It is important to provide children with accurate and scientific information while also protecting them from potentially harmful content. This highlights the need for a comprehensive and inclusive approach to online education.

There are ongoing discussions regarding the implementation of new regulations to safeguard children online. The speaker questions whether there is a balance between raising awareness and imposing obligations on service providers under these regulations. This reflects the growing recognition of the importance of protecting children from abuse, exploitation, and violence online.

In terms of ensuring child safety online, the audience argues for not only blocking but also removing harmful content. Simply blocking such content may not be sufficient, as individuals seeking it may find ways to circumvent these blocks. Therefore, the removal of harmful content becomes crucial to guarantee the safety of children.

In conclusion, the discussion emphasizes the need for a balanced approach that upholds children’s right to access accurate information while safeguarding them from harmful content. The introduction of new regulations and the emphasis on removing, not just blocking, harmful content further demonstrate the commitment towards ensuring online child safety. This signifies progress in protecting children from abuse, exploitation, and violence in the digital realm.

Noteworthy topics discussed include children’s rights, online safety, access to information, and sexuality education. Additionally, the discourse touches upon the relevance of the UN Convention on the Rights of the Child and the impact of digital regulation on children’s rights and internet safety. These aspects contribute to a comprehensive understanding of the subject matter and highlight the interconnections between various global initiatives, such as SDG 4: Quality Education, SDG 5: Gender Equality, and SDG 16: Peace, Justice, and Strong Institutions.

Tatsuya Suzuki

During the discussion, the speakers emphasised the need to enhance internet safety for children. They highlighted the importance of having a comprehensive plan in place to ensure the secure use of the internet by children. This plan involves collaborative efforts with various stakeholders, including academics, lawyers, communications companies, and school officials. These groups can work together to develop strategies and guidelines that promote responsible internet use among children.

The speakers also expressed their support for public-private initiatives aimed at addressing online child abuse and exploitation. They recognised the crucial role of the Child Welfare Agency in upholding the interests of the private sector in these efforts. Additionally, they highlighted the active collaboration between the agency and the Ministry of Education, Culture, Sports, and Tourism, as well as the involvement of Japanese UNICEF. These collaborations are important in developing effective and comprehensive approaches to combating online child abuse and exploitation.

Overall, the sentiment expressed during the discussion was positive, with a strong emphasis on implementing measures to protect children online. The speakers recognised the urgency and importance of ensuring the safety and security of children in their online activities.

Through the analysis, it is evident that this issue is aligned with Sustainable Development Goal 16.2, which aims to end abuse, exploitation, trafficking, and all forms of violence and torture against children. By addressing the challenges of internet safety and working towards its improvement, progress can be made towards achieving this goal.

In summary, the discussion highlighted the necessity of implementing initiatives to improve the safe and secure use of the internet for children. Collaboration with various stakeholders, such as academics, lawyers, communications companies, and school officials, is essential in developing a comprehensive plan. The support for public-private initiatives in tackling online child abuse and exploitation was also emphasised, acknowledging the roles of the Child Welfare Agency, Ministry of Education, Culture, Sports, and Tourism, and Japanese UNICEF. Overall, there was a positive sentiment towards the implementation of measures that protect children online, aligning with Sustainable Development Goal 16.2.

Moderator – Afrooz Kaviani Johnson

Child exploitation on the internet is an ongoing issue that has evolved over the years. It now encompasses more than just explicit materials, but also the ways in which technology enables abuse. To effectively address this issue, collaboration across sectors is crucial.

Australia’s eSafety Commissioner is at the forefront of combating online abuse. This government agency has implemented a range of regulatory tools to drive industry-wide change. The role of Australia’s eSafety Commissioner in spearheading these efforts is commendable.

The involvement of the private sector is also vital in protecting children online. Companies are increasingly being called upon to take proactive measures and be accountable for their responsibilities in ensuring online child safety. These discussions involve industry experts from various countries, including Japan’s private sector and BSR Business for Social Responsibility.

Japan is making significant strides in enhancing internet safety for young adolescents. The country’s Child Welfare Agency and multiple stakeholders, such as academics, lawyers, communications companies, school officials, and TTA organizations, are actively involved in creating a safe and secure online environment for young people. Japan’s measures in this regard have been positively received and appreciated.

Recognising the importance of private sector involvement, Japan’s Child Welfare Agency has developed the Internet Environment Management Act, which respects the individual and subjective interests of private organizations. These organizations are actively engaged in ensuring the safe and secure use of the internet by children.

Addressing online child abuse is a complex and challenging task. Mr Suzuki, a prominent speaker, highlighted the various ways in which children can fall victim to online abuse, emphasising the need for parental involvement and proper ‘netiquette’. In Ghana, collaborative regulation involving tech companies has been adopted to tackle online child abuse.

Continued learning and knowledge exchange are crucial in combating online child abuse. A recent discussion on internet literacy and online child abuse served as a fruitful exercise and a positive step in addressing the issue. Ultimately, promoting sustainable development by ensuring all learners acquire the necessary knowledge and skills is vital.

In conclusion, addressing the issue of child exploitation on the internet requires collaboration across sectors, involvement of government agencies like Australia’s eSafety Commissioner, proactive engagement of companies, efforts from countries like Japan, and continued learning. These various approaches collectively work towards protecting children online and making the digital world a safer space for young people.

Toshiyuki Tateishi

Summary:
The Japanese private sector has adapted over the past decade to address the challenges of online child sexual abuse and exploitation. Japan has a constitutional law that protects the secrecy of communication, preventing the blocking of certain websites. They have also implemented mechanisms, such as the Jeopardy system, to block access to illegal sites. If the abusive site is located in Japan, it is deleted by the ISP and investigated by the police. If the site is overseas and found to be sexually abusive, it is promptly blocked. Japan’s approach to internet safety has been commended for its low level of government interference with digital freedoms. They emphasize balancing freedom of communication, security, and innovation online. Communication is seen as crucial before taking down any content, even engaging with parties located overseas. Overall, Japan’s comprehensive approach demonstrates its commitment to creating a safe online environment and addressing online child abuse and exploitation.

Edit:
The private sector in Japan has proactively responded to the emerging challenges of online child sexual abuse and exploitation in recent years. Japan has enacted a constitutional law that safeguards the confidentiality of communication, thereby prohibiting the blocking of certain websites. To combat online child abuse, Japan has established mechanisms like the Jeopardy system, which enables DNS servers to block access to illegal sites. If an abusive site is discovered within Japan, the Internet Service Provider (ISP) will delete it and involve the police for further investigation. In the case of overseas sites, a thorough examination is conducted, and if found to contain sexually abusive content, it is promptly blocked. Japan’s efforts to combat online child abuse have been recognized by a 2016 UN report for preserving digital freedoms with minimal government interference. They place a particular emphasis on striking a balance between freedom of communication, security, and innovation in the online realm. Additionally, before taking down any content, Japan believes in attempting communication with the relevant parties, even if they are located overseas. This approach underscores the importance of dialogue and potential collaboration with foreign entities to effectively address online safety concerns. Overall, Japan’s comprehensive strategy exemplifies its unwavering dedication to promoting a secure online environment and combating online child abuse and exploitation.

Dunstan Allison-Hope

Human rights due diligence plays a vital role in upholding child rights and combating the alarming issue of online child sexual exploitation and abuse. Business for Social Responsibility (BSR) emphasises that incorporating human rights due diligence is essential for companies to demonstrate their commitment to the well-being of children. BSR has conducted over 100 different human rights assessments with technology companies, highlighting the significance of this approach.

A comprehensive human rights assessment involves a systematic review of impacts across all international human rights instruments, focusing on safeguarding rights such as bodily security, freedom of expression, privacy, education, access to culture, and non-discrimination. It is crucial to adopt a human rights-based approach, which includes considering the rights of those most vulnerable, particularly children who are at a greater risk.

The European Union Corporate Sustainability Due Diligence Directive now mandates that all companies operating in Europe must undertake human rights due diligence. As part of this process, companies must evaluate the risks to child rights and integrate this consideration into their broader human rights due diligence frameworks. By explicitly including child rights in their assessments, companies can ensure that they are actively addressing and preventing any potential violations.

However, it is important to maintain a global perspective in human rights due diligence while complying with regional laws and regulations. Numerous regulations from the European Union and the UK require human rights due diligence. However, there is a concern that so much time and attention going towards the European Union and the United Kingdom takes time away from places where human rights risks may be more severe. Therefore, while adhering to regional requirements, companies should also consider broader global approaches to effectively address human rights issues worldwide.

A holistic human rights-based approach seeks to achieve a balance in addressing different human rights, with a specific focus on child rights. Human rights assessments typically identify child sexual exploitation and abuse as the most severe risks. To ensure the fulfilment of all rights, a comprehensive assessment must consider the relationship between different human rights, with considerations given to tensions and the fulfilment of one right enabling the fulfilment of other rights.

Another crucial aspect of human rights due diligence is the application of human rights principles to decisions about when and how to restrict access to content. Cases before the meta-oversight board have shown that having the time to analyse a condition can provide insights and ways to unpack the relation between rights. Applying human rights principles like legitimacy, necessity, proportionality, and non-discrimination to decisions about when and how to restrict access to content helps ensure a balanced approach.

It is also important to provide space to consider dilemmas, uncertainties, and make recommendations in cases relating to human rights, particularly child rights. Highlighted is the use of space available for the meta-oversight board to make decisions and the idea for similar processes to take place concerning child rights is welcomed. This helps ensure that informed decisions, considerations of different perspectives, and recommendations can be made.

In conclusion, human rights due diligence is vital to respect and safeguard child rights and combat online child sexual exploitation and abuse. By integrating child rights into their broader human rights due diligence, companies can demonstrate their commitment to the well-being of children. While complying with regional laws, it is crucial to adopt a global approach to effectively address human rights risks. A holistic human rights-based approach considers the interrelationships between different rights, while the application of human rights principles guides decisions about content access. Providing space for deliberation and recommendations in cases involving child rights is fundamental to making informed decisions and ensuring the protection of children’s rights.

Albert Antwi-Boasiako

The approach adopted by Ghana in addressing online child protection is one of collaborative regulation, with the objective of achieving industry compliance. In line with this, Section 87 of Ghana’s Cyber Safety Act has been established to enforce industry responsibility in safeguarding children online. The act provides provisions that compel industry players to take action to protect children from online threats.

Furthermore, Ghana’s strategy involves active engagement with industry players, such as the telecommunications chamber, to foster mutual understanding and collaboratively develop industry obligations and commitments. This collaborative approach highlights the importance of involving industry stakeholders in shaping regulations and policies, rather than relying solely on self-regulation.

The evidence supporting Ghana’s collaborative regulation approach includes the passing of a law that includes mechanisms for content blocking, takedown, and filtering to protect children online. These measures demonstrate the government’s commitment to ensuring the safety of children in the digital space.

The argument put forth is that self-regulation alone cannot effectively keep children safe online, as it may not provide sufficient guidelines and accountability. On the other hand, excessive regulation can stifle innovation and hinder the development of new technologies and services. Ghana’s approach strikes a balance by fostering collaboration between the government and industry players, promoting understanding, and establishing industry obligations without impeding innovation.

In conclusion, Ghana’s collaborative approach to online child protection aims to ensure industry compliance while striking a balance between regulation and innovation. By actively engaging with industry stakeholders, Ghana seeks to develop effective measures that safeguard children online without stifling technological advancement. This approach acknowledges the limitations of self-regulation and excessive regulation, thus presenting a more holistic and effective approach to online child protection.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more