How Submarine Cables Enhance Digital Collaboration | IGF 2023 Town Hall #80

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Hendrik Ike

Submarine cables play a critical role in facilitating international cooperation in internet governance and diplomacy. The agreements between various entities, such as NRENs/Rens, are built on trust and reciprocity. These agreements enable public entities to share and disseminate public research and educational data, fostering collaboration and knowledge exchange.

The evolving landscape of internet ownership and utilization underscores the significance of an open, resilient, and distributed internet structure to support research and education. The demand for investments in submarine systems is driven by the growth of research and educational activities, particularly in remote and traditional routes.

Submarine cables also serve as physical geopolitical solutions to the increasingly politicized internet. By providing reliable connectivity across borders, submarine cables promote international collaboration in research and education. This aligns with the goals of SDG 9: Industries, Innovation, and Infrastructure, and SDG 17: Partnership for the Goals in fostering global partnerships.

Strategic agreement provisions for submarine cables between the European Union and Japan have significant implications for scientific, political, and economic aspects. These agreements demonstrate the recognition of the importance of submarine cables in facilitating international cooperation and advancing research and educational initiatives.

However, the construction and operation of submarine cable systems present complex challenges. Paul Rouse describes them as intricate engineering projects that require careful design and construction. The complexity arises from the various components involved and the need to navigate through different territories and environments.

Successful submarine cable projects often involve multi-stakeholder collaborations. The involvement of multiple member states or nations enhances project outcomes and strengthens partnerships. Hendrik Ike highlights the importance of multi-stakeholder collaboration in achieving project success, enabling different interests and expertise to contribute to the project’s objectives.

To summarize, submarine cables are crucial for international cooperation in internet governance, diplomacy, research, and education. Trust-based agreements facilitate the exchange of public research and educational data. The evolving internet landscape necessitates an open and resilient structure. Submarine cables also provide geopolitical solutions and are strategically recognized by the European Union and Japan. However, the complexity of designing and implementing submarine cable systems requires careful planning and coordination, often through multi-stakeholder collaborations.

Jun Murai

The discussions revolve around various topics related to infrastructure, technology, and funding in the Asia-Pacific region. The WIDE project, which has been operational for 35 years, focuses on improving infrastructure and technology research for the internet in the Asia-Pacific region. It involves more than 100 companies, including Starbucks, and encompasses professionals, engineers, and scientists. This project has a positive sentiment and aims to enhance internet infrastructure and technology research.

The need for a large funding body in the Asia-Pacific region similar to the EU and US is highlighted. The EU and US have significant funding bodies promoting research that ultimately results in the installation of submarine cables. However, the Asia-Pacific region lacks such a body, leading to the argument that there is a need for one to facilitate the installation of new submarine cables. This argument is expressed with a neutral sentiment.

The WIDE project started ARINAPAC, an arterial research and educational network, to create a supportive infrastructure in the Asia-Pacific region and link it to Europe and America. This initiative receives positive sentiment and supports the SDG goals of industry, innovation, and infrastructure and partnerships for the goals.

There is also support for the development of Wet ROADM (reconfigurable optical add and drop multiplexer) technology for submarine cables. Wet ROADM allows for the reconfiguration of spectrum splitting for future adjustments and enables adding or dropping traffic without reinstalling the fiber. This positive sentiment stance supports SDG goal 9.

The importance of effective collaborative projects between multiple stakeholders is emphasized by Jun Murai, with in-kind contributions being a significant aspect. Past collaborations mentioned include satellite transponder companies working together and high-speed switches and equipment developers participating in interoperability testing. Additionally, a wide project exploring new technology is mentioned, highlighting the mutual benefits of collaboration from an investment perspective. This argument has a positive sentiment and emphasizes the importance of collaboration and in-kind contributions for future networking progress.

Connectivity in Southeast Asia is seen as crucial, with Jun Murai supporting collaboration between the EU and JAN. The initiation of IHPI and satellite utilization, as well as the reference to 10 efforts to connect as the next generation of terrestrial connectivity, are mentioned. A three-phase plan is also outlined, involving satellite connection as phase 1, TEN connectivity as phase 2, and the redesigning of southern connectivity utilizing the Arctic Ocean as phase 3. This argument has a positive sentiment and highlights the importance of collaboration for enhancing connectivity in Southeast Asia.

Tain, the giant version and regional network of Southeast Asia, is mentioned to have started in the 80s, while the cable CAE-1 began in the middle 90s. These historical facts are mentioned neutrally.

Research and educational networks contribute a small percentage, around 5-10%, of the total installation costs of cables like NordNet. It is mentioned that it is possible, though not easy, to raise funds for research and education to cover 5% of the entire cable installation costs. This argument has a neutral sentiment and highlights the contribution of research and educational networks.

Once installed, the research and educational community will occupy about 5% of the capacity on the fiber pair. This positive sentiment argument emphasizes the usage of fiber capacity by the research and educational community.

The EU-Japan Digital Partnership Agreement endorses the project and extends the scope of people involved. It also promotes the benefits of investing in optical fiber to various industries. This argument has a positive sentiment and supports the importance of partnerships and endorsements for the project’s success.

Jun Murai believes that the special approach taken by the research and education community in actively initiating the project and inviting other stakeholders to get involved is unique and has not been done in the past. This positive sentiment argument emphasizes the importance of the research and education community’s active involvement.

Japan’s high frequency of earthquakes is mentioned in discussions related to the smart cable concept, which involves piggybacking sensors on commercial communication cables. It is argued that this concept is not enough for Japan due to the frequency of earthquakes, resulting in a negative sentiment.

Investment for the specific installation of sensor cables at the bottom of the ocean, identified as a dangerous area due to earthquakes, is seen as necessary for earthquake preparedness. It is argued that this investment can help in preparing for future catastrophes. This argument has a positive sentiment and supports the importance of investing in sensor cables for earthquake preparedness.

Japan has different funding sources for commercial companies, research, education, and seismic operations due to the frequency of earthquakes. This positive sentiment argument highlights the unique funding decision-making in Japan influenced by the frequency of earthquakes.

In conclusion, the discussions highlight the importance of infrastructure, technology, and funding in the Asia-Pacific region. Projects like WIDE and ARINAPAC aim to improve internet infrastructure and create supportive networks. There is a need for a large funding body to support submarine cable installation, similar to the EU and US. Collaboration and in-kind contributions are seen as important for future networking progress. Jun Murai emphasizes the importance of connectivity in Southeast Asia and the significance of collaboration between the EU and JAN. Additionally, the importance of investment in sensor cables for earthquake preparedness in Japan is emphasized. The discussions also highlight the different funding sources in Japan due to the frequency of earthquakes.

Audience

During a discussion, an audience member raised a question regarding the cost comparison between transferring energy and transferring data. This query sparked interest and highlighted the importance of understanding the financial implications of such processes.

In another point of discussion, the topic of installing cables in icy regions was explored. It was revealed that this project would be costly and resource-intensive, potentially requiring the commissioning of a new icebreaker. The task was considered a significant challenge, particularly when attempting to accomplish it without the assistance of immigrants alone. It became evident that substantial resources and funding would be required to successfully carry out the installation.

The need for government endorsements and funding emerged as a key aspect of the project. Participants agreed that financial support from the government would help alleviate the cost burden associated with the installation of cables. Furthermore, the issue of financial viability and return on investment was raised, reinforcing the importance of government involvement in this initiative.

Collaboration between various regions, namely Nordic, European, and Asian countries, was identified as a potential solution to facilitate the project’s progress. It was suggested that a common understanding and agreement on funding the project among these regions could lead to more efficient and effective implementation.

Switching gears, the discussion turned to the business case for the ability to predict natural disasters such as tsunamis and earthquakes. The potential benefits of accurate predictions were highlighted, including the reduction of costs associated with disaster recovery. In addition, it was pointed out that companies like Google and British Telecom were already testing predictive technologies, which could open up new revenue streams. This observation emphasized the need for companies to explore and capitalize on the opportunities presented by disaster prediction services.

In conclusion, the discussion covered various aspects related to the costs, resources, and collaborative efforts required for projects involving transferring energy and data, installing cables in icy regions, securing government endorsements and funding, and exploring the potential of disaster prediction services. The importance of government support, collaboration between different regions, and seizing new revenue streams were emphasized as crucial factors for the success of these initiatives.

Ieva Muraskiene

Submarine cables across the Arctic have the potential to revolutionise connectivity between Europe and Asia by offering a faster, more reliable, and geopolitically stable connection. Currently, 90% of direct traffic between the two continents goes through the congested Suez Canal, but the Arctic route presents a shorter distance and can avoid geopolitical complications by passing through the exclusive economic zones of Norway, Denmark, Canada, the US, and Japan. This alternative route has the potential to alleviate congestion and improve data transfer efficiency.

Additionally, the analysis highlights the potential for submarine cables in the Arctic to support the green data centre industry. The abundant surplus of renewable energy in the far north is currently underutilised due to a lack of power infrastructure. By leveraging submarine cables, this excess energy can be effectively harnessed to power data centres. Data transfer is more efficient and cost-effective than moving energy, and the cool climate in the northern regions can assist in dissipating the heat generated by data centres, reducing energy consumption and environmental impact.

To realise the vision of Arctic connectivity by 2030, two potential projects are identified: PolarConnect and Far North Fiber. Expected to be operational by 2030, these projects would establish reliable submarine cable connections in the Arctic. PolarConnect spans a total distance of 11,000 kilometres, while Far North Fiber covers 14,500 kilometres. These projects hold the potential to unlock the vast benefits of Arctic connectivity and bridge the digital divide.

In addition to enhancing connectivity, submarine cables equipped with sensors can also serve as powerful scientific instruments. These cables can be utilised for distributed acoustic sensing or state of polarization technology, allowing them to collect valuable data for monitoring Earth’s conditions, marine life, and seismic research. The ability to measure temperature, pressure, velocity, and salinity provides valuable insights into climate change and oceanic processes. Furthermore, the sensors can aid in the protection and monitoring of the cables themselves.

The analysis also touches on the cost disparities between transferring energy and data. The report acknowledges that the lack of infrastructure largely contributes to the cost difference. However, it emphasises the need for further exploration of the value proposition of energy versus data transfer. This information would provide valuable insights for decision-makers and assist in the development of infrastructure to support both energy and data transfer.

Engagement with governments and the European Commission is considered essential to secure funding and support for these projects. The Nordic countries, in particular, are recommended to communicate with their respective governments to obtain the necessary endorsements and support. The European Commission can also play a crucial role in exploring funding opportunities for these projects, aligning with SDG 17, which emphasises partnerships for attaining goals.

It is worth noting that the potential of submarine cables in the Arctic extends beyond mere connectivity. The analysis highlights multiple use cases and benefits across various sectors, including research, education, and the commercial sector. The project can contribute to early warnings for natural disasters and seismic activity, providing valuable information for scientific research and supporting SDGs 9 and 13.

In conclusion, the analysis showcases the immense potential of submarine cables across the Arctic. These cables offer a faster, more reliable, and geopolitically stable connection between Europe and Asia, bypassing congested areas like the Suez Canal. They not only facilitate efficient data transfer but also support the green data centre industry by utilising excess renewable energy and managing the heat generated by data centres. The PolarConnect and Far North Fiber projects are anticipated to realise the vision of Arctic connectivity by 2030. Furthermore, submarine cables equipped with sensors have the potential to serve as scientific instruments, collecting valuable data for observing the Earth, marine life, and seismic research. Engagement with governments and the European Commission is crucial for securing funding and support for these projects. The potential of submarine cables in the Arctic extends beyond connectivity, offering multiple benefits and use cases across different sectors.

Dr. Masafumi Oe

The National Astronomical Observatory of Japan (NAO-J) operates astronomical facilities globally that rely on large volumes of data for research and analysis. To support this need, high-bandwidth networks are essential. The Subaru Telescope, which was established in 1999, has recently undergone system upgrades, including the addition of the hyperspring cam. As a result, the telescope’s data can now be efficiently transferred to Tokyo for analysis through a 100 gigabit Ethernet network, improving data transfer capabilities.

In addition, the ALMA (Atacama Large Millimeter/submillimeter Array) project is currently upgrading its network infrastructure to a 1.2 terabit capacity. This upgrade will enable synchronous data transfer from all ALMA receivers, enhancing overall data transfer capabilities for the project. Dr. Masafumi Oe supports these network improvements for big science astronomy facilities, as it allows them to meet the demands of modern research effectively.

One significant outcome of these network upgrades is the reduction in data analysis time. With the upgraded network, the Subaru Telescope can now analyze data in under 10 minutes, demonstrating the positive impact of enhanced network capacities on research efficiency. Additionally, the 1.2 terabit network infrastructure upgrade for the ALMA project promises improved efficiency and reliability in astronomical research through enhanced data transfer capabilities.

The evidence strongly supports the argument that high-bandwidth networks are crucial for the advancement of modern astronomical research. The notable achievements of the Subaru Telescope and the ongoing network upgrade for the ALMA project highlight the benefits that improved network capacities bring to big science astronomy facilities. The positive sentiment surrounding these advancements, along with Dr. Masafumi Oe’s endorsement, further emphasizes the importance of upgrading network capacities for the progression of astronomical research.

Overall, the National Astronomical Observatory of Japan operates astronomical facilities globally that heavily rely on large datasets, making high-bandwidth networks essential. The upgrades made to the Subaru Telescope’s data transfer capabilities and the ongoing network upgrade for the ALMA project underscore the significance of improving network capacities for modern astronomical research. The reduction in data analysis time and the endorsement of Dr. Masafumi Oe enhance the overall efficiency and progress of big science astronomy facilities. These advancements contribute to the overall efficiency and progress of astronomical research.

Paul Rouse

The analysis explores the role of submarine cables in supporting research and education, highlighting that 98-99% of global internet traffic is transmitted through these cables. They not only facilitate data transmission but also offer physical solutions to the increasingly politicized internet, benefiting research and education. The agreements between research and education networks at national and regional levels, based on trust and reciprocity, form the foundation for submarine cable usage in this context.

However, concerns arise regarding the changing ownership and utilization of submarine cable infrastructure. Content providers like Google, Microsoft, and Facebook are increasingly acquiring a larger share of the market, potentially reducing available capacity. This poses a risk in meeting the demands of research and education missions adequately.

To address these challenges and ensure critical infrastructure availability, proactive measures and investment in submarine systems are essential. Recent collaborations serve as examples, such as Géant partnering with the European Investment Bank and DG NIR from the European Commission to invest in the Medusa submarine cable system in the Mediterranean Sea, improving connectivity for North African countries. Additionally, Red Clara collaborated with Géant and received funding from the European Commission to invest in a new submarine cable connecting Europe to Latin America.

The analysis acknowledges the Bella project as a trailblazer amongst National Research and Education Networks (NRENs) worldwide. The project encountered various hurdles, including limited experience in submarine cable investments initially and economic difficulties, particularly in Brazil. Nonetheless, it emphasized the significance of stakeholder engagement, compliance, governance, and financial requirements in realizing successful submarine cable projects.

Collaboration and partnership emerge as recurring themes throughout the analysis. NRENs alone cannot deliver the necessary infrastructure and support; collaboration with commercial partners is crucial. The analysis suggests that NRENs are desirable partners due to their capacity to mitigate risks using public funds.

In conclusion, the analysis underscores the importance of submarine cables in supporting research and education. While concerns exist regarding changing ownership and utilization, proactive measures, investment, collaboration, and partnerships are crucial to secure critical infrastructure. The Bella and Medusa projects serve as successful collaboration examples, reflecting the value of government support, funding bodies, user communities, and the skills within NRENs. Moving forward, fostering collaboration and partnerships between NRENs and other entities will be instrumental in ensuring continuous growth and success in research and education pursuits.

Keiko Okawa

Two speakers in Asia highlight the crucial role of internet connectivity in promoting educational and research collaboration in the region. The first speaker stresses the necessity of internet access for internet engineers, as it not only supports sustainable development but also enhances collaboration among professionals in the field. They propose the implementation of an Asia-wide educational programme for internet engineers, which would ensure that they have the necessary education and connectivity to contribute effectively to the region’s progress.

The second speaker focuses on the long history of collaboration among universities in Asia, which has been facilitated by internet connectivity. They highlight the ‘Asia Internet Interconnection Initiative’, which was launched in 1996 with the aim of connecting universities across the region. This initiative has played a vital role in fostering knowledge sharing and learning among academic institutions. Furthermore, the establishment of the ‘School of the Internet’ in 2001 has further contributed to the exchange of ideas and information among universities in Asia.

Both speakers emphasise the positive impact of internet connectivity on education and partnership building in Asia. They highlight the importance of enabling access to high-speed internet for educational institutions, as it plays a crucial role in connecting these institutions and facilitating research activities. The first speaker mentions that Asia university partners are excited about the new high-speed network, showing the enthusiasm and support for such initiatives.

Furthermore, evidence of internet connectivity’s impact is demonstrated by the fact that as of 2019, almost 60% of the population in Asia was connected. This wide access to the internet has undoubtedly contributed to the growth of educational and collaborative networks across the region.

In conclusion, internet connectivity in Asia is recognised as a fundamental force driving educational and research collaboration. By providing internet access to internet engineers and enabling universities to connect and share knowledge, sustainable development and partnership building in the region can be greatly enhanced. The examples of initiatives like the ‘Asia Internet Interconnection Initiative’ and the ‘School of the Internet’ demonstrate the long-standing commitment to collaboration and shared learning among universities in Asia. With the continued efforts to expand and improve internet connectivity, the potential for educational and research collaboration in Asia is immense.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Gathering and Sharing Session: Digital ID and Human Rights C | IGF 2023 Networking Session #166

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Speaker 3

Speaker 3 discusses two initiatives aimed at solving problems within the coalition. The first initiative is the National Legislation Mapping Group, which conducts mapping exercises to understand the development of ID systems in different countries. This group recognizes that the issuing and implementation of nationality programs vary greatly across the world and seeks to compare and understand these differences. By doing so, they aim to identify best practices and foster collaboration between countries.

The importance of the National Legislation Mapping Group’s work is emphasized by Speaker 3. Through their mapping exercises, the group hopes to create a comprehensive understanding of the different approaches and challenges in developing ID systems. This knowledge can then be used to inform policy decisions and drive innovation in the field of identity management. The group’s work is particularly relevant to SDG 9: Industry, Innovation, and Infrastructure, as it aims to improve the efficiency and effectiveness of identification processes worldwide.

Speaker 3 also highlights the collaborative and flexible nature of the methodology used by the mapping group. Each member contributes their ideas to the development of the methodology, ensuring that it reflects diverse perspectives and is adaptable to different contexts. This flexibility is vital for newcomers to easily understand and contribute to the mapping exercises.

Furthermore, the National Legislation Mapping Group has specific goals and aims for its work. They aim to develop a tool that can be hosted on each organization’s website, making the information easily accessible to stakeholders. This tool would enable organizations to compare and learn from the different legislative approaches employed by countries around the world. Additionally, the group aspires to adopt a more quantitative approach in the future, further enhancing the accuracy and comprehensiveness of their mapping exercises.

In conclusion, the initiatives discussed by Speaker 3 are positive steps towards achieving the goals of the coalition. By mapping the development of ID systems and understanding the varying approaches to nationality programs, the National Legislation Mapping Group is contributing to the partnership for SDG 17: Partnerships for the Goals. Their collaborative and flexible methodology ensures that all members of the group can contribute effectively. The goals and aims of the mapping group highlight their commitment to advancing knowledge and promoting best practices in the field of identity management. Ultimately, these initiatives have the potential to drive innovation, foster collaboration, and create positive change within the coalition.

Audience

The speakers at the event covered various topics related to proactivity, digital ID systems, biometrics, and government cooperation. They highlighted the importance of proactive initiatives within organizations, advocating for the need to put things on the agenda themselves. The audience agreed that Caitlyn’s organization supports proactivity and is not just reactive but also proactive.

The discussion also touched upon the implementation of digital ID systems in different countries. The World Bank has been advocating for the entity system, which is being used in countries with numerous problems. The audience believes that the entity system is perceived as a solution for struggling countries, and the World Bank has been endorsing it as a proposed fix.

The government in Mexico is trying to pass a law to expand the digital ID system, raising concerns about the use of funds collected through digital ID. Similarly, there is an expectation for the implementation of mandatory digital ID in Mexico. In Iraq, it was stated that there is currently no biometric system in place.

The introduction of biometric passports worldwide has been initially rejected by most countries but later accepted. Hugo Cordova, an employee of the European Parliament, is currently working on legislation to introduce electronic IDs for Europe.

Concerns were raised about the coexistence of international and national digital identity initiatives and their respective purposes. The audience highlighted the need for clarity on how multiple digital identity initiatives would cohabit. The discussion also touched upon the entry process for various coalitions, as Camila wanted to know how to join.

Armando Manzuela from the Dominican Republic expressed his interest in seeing the scope of a study extended to other countries within the same region. He offered to share plenty of information from his country. The convergence of national and supernationals electronic identity systems into international standards was seen as a possibility in the future, but concerns were raised about the governance of these systems and the need for privacy safeguards.

The principle of necessity was emphasized for digital ID systems, as it was argued that each system should be based on the principle of necessity and not applicable to all contexts. Digital ID systems were also discussed as socio-technical systems, not just technological systems, where context should be carefully considered in analyses. Extensive documentation of the harms that digital ID systems can create and exacerbate was also highlighted.

The speakers also touched upon the importance of public interest litigation and the potential involvement of individuals. The audience acknowledged and appreciated the influence of work done on multinational and national issues related to digital identification. However, concerns were raised about the lack of engagement with communities and the penetration level of the ID system in certain countries.

The significance of digital identity as the entry to the digital economy and society was discussed. The implementation of digital identity was seen as a way to track individuals, and there was increasing momentum from both the government and private sector for its implementation. However, doubts were raised about whether digital identity could be implemented correctly given the pressure.

There was mention of a private meeting on litigation about digital ID, indicating that Peter from Access Now is planning to discuss this topic at the meeting. He also expressed the need for a better acronym for their network.

The importance of multilateral engagement for the proactive development of the Digital Public Infrastructure (DPI) safeguards initiative was discussed. The need for a deeper and more participatory engagement process beyond unilateral consultation was emphasized, as the coalition aimed to not just contribute inputs but also receive feedback. The upcoming summit of the future was seen as a pivotal moment for the coalition.

The tech envoy’s insight into the safeguards process’ timeline and key engagement opportunities was highly sought after, as the coalition was eager to prepare for future engagements. The coalition also stressed the importance of civil society involvement and accountability in digitization interventions.

The UNDP’s signing of an MOU with the Kenyan government regarding digital ID without civil society or community engagement was criticized. The audience believed that the UNDP should not abet exclusion in digitization interventions and should be accountable. Transparency and the right to information were seen as essential, and there were concerns about the lack of information regarding the negotiated protection mechanisms concerning civil society.

The benefits of open-source technology for critical systems development by the government were highlighted. Open-source technology was seen as a way to ensure safety, security, and trust in government systems, and it also opened up the possibility for global contribution to what was being built. The audience expressed the belief that everything should be digitized using open-source technology to prevent issues faced by countries with their digital systems.

Regarding government cooperation, the audience expressed a desire for more transparency and communication. There were incidents of claimed public participation without actual involvement, and progress in advocacy in Kenya related to the Data Protection Act and digital access was discussed. It was stressed that the government should work effectively with civil societies and the UNDP.

The event also saw community members expressing their interest in joining the community and asking how to get involved. One audience member, who represented a tech company, T4Beast, with a strong presence in the MENA region, highlighted their expertise in supervision, digitalization, and security. The audience believed that T4Beast was the biggest in the region and valued their close partnership in META.

In conclusion, the event covered a wide range of topics related to proactivity, digital ID systems, biometrics, and government cooperation. The speakers and audience highlighted the importance of proactive initiatives, community engagement, transparency, open-source technology, and effective communication between stakeholders. They also discussed the potential risks and benefits associated with the implementation of digital ID systems. The speakers emphasized the need for context-specific approaches to digital ID systems and the importance of privacy safeguards. Overall, the event provided valuable insights and sparked important discussions about the challenges and opportunities in the digital identification landscape.

Speaker 5

The team responsible for organising the Summit for the Future has developed a plan to host multiple convenings in the lead-up to the summit. These convenings aim to gather input and feedback on the overall process, ensuring that a diverse range of perspectives and ideas are considered.

In addition to in-person convenings, a virtual platform will be provided for individuals unable to attend in person. This platform will enable participants to share their experiences and contribute to the dialogue, ensuring that everyone has an opportunity to actively participate and provide insights, regardless of physical presence.

One of the summit speakers strongly advocates for open dialogue and collective input, emphasising the importance of civil society’s involvement. The speaker encourages civil society to engage and participate in the summit’s discussions. This approach highlights the significance of inclusivity and diversity in decision-making processes and underscores the role of civil society in shaping the summit’s outcomes.

Overall, the team’s plan for the convenings, the inclusion of a virtual platform, and the call for open dialogue and collective input demonstrate a commitment to creating an accessible, inclusive, and responsive space. This approach aims to represent a wide range of voices and interests, fostering collaboration and partnership during the summit.

Amandeep Singh Gill

There is a growing interest in Digital Public Infrastructures (DPIs), and more investments are being directed towards them. It is crucial to develop a safeguards framework to protect the safety, security, human rights, and sustainability considerations associated with these infrastructures. This framework aims to ensure that investments in digital infrastructure do not lead to violations in these areas.

Addressing the issue of exclusion in digital public infrastructures, especially for marginalized groups, is also important. Efforts should be made to avoid excluding these groups and ensure that DPIs are accessible and inclusive for everyone.

Prominent advocate Amandeep Singh Gill suggests the formation of multi-stakeholder partnerships to develop and implement effective safeguards. Involving various stakeholders, including governments, civil society organizations, and the private sector, these partnerships can establish comprehensive safeguards for DPIs.

To support this initiative, the UN Secretary-General’s tech envoy launched an initiative with the UNDP on DPI safeguards, reflecting a positive sentiment towards the need for these safeguards.

Regarding governance, there are plans to establish a governance structure for the DPI initiative. This structure will include an advisory board and a steering committee, contributing to the decision-making process. Additionally, efforts are underway to identify learning partners who can provide valuable insights and contribute to the development of this governance structure.

Engaging civil society and the private sector is also a priority, particularly in developing digital ID systems. Consultations with these stakeholders are planned, recognizing the key role the private sector can play in developing digital identification systems.

The overarching goal is to leverage DPIs in a human-centered and human rights-respecting manner to advance the Sustainable Development Goals (SDGs). Planning for a good and ambitious global digital compact is underway to ensure DPIs significantly contribute to the achievement of the SDGs.

A noteworthy observation is Amandeep Singh Gill’s emphasis on joint participation in building and maintaining digital platforms. He suggests involving the community in the process, enabling them to contribute to the development and maintenance of digital systems.

Furthermore, Amandeep Singh Gill highlights the importance of accountability for UN agencies in maintaining DPIs and digital services. He suggests holding these agencies accountable as per the safeguards framework to ensure effective management of digital services.

In conclusion, there is a need to establish a safeguards framework around DPIs, ensuring safety, security, human rights, and sustainability considerations are not violated. Multi-stakeholder partnerships, governance structures, and engagement with civil society and the private sector are key elements in developing and implementing effective safeguards. Leveraging DPIs in a human-centered manner can significantly contribute to the attainment of the SDGs. Additionally, promoting joint participation and accountability are crucial in maintaining DPIs and digital services on the ground.

Speaker 1

The organization being discussed is a global coalition of civil society comprising diverse members, ranging from small grassroots organizations to large multinational NGOs. These members employ various approaches, including advocacy, lobbying, and strategic litigation, to advance their goals.

A significant highlight is the organization’s transition from a reactive to a proactive approach in the context of digital identity systems. Instead of merely reacting to opportunities, they now actively identify and pursue them. This proactive mindset enables them to develop shared resources and leverage their community’s strengths to achieve more inclusive outcomes.

Multilateral engagement and national level advocacy have been identified as key priorities for collective action. The organization seeks to incorporate its members’ concerns, information, and expertise in multilateral spaces and international organizations. Additionally, they focus on advocacy at the national level to promote human rights.

Speaker 1 demonstrates a positive stance towards the organization’s evolution and development. They highlight achievements such as agreeing on a shared vision, formalizing a structure, and identifying key priorities. The transition from a reactive to proactive approach is seen as a significant advancement.

The ongoing discussion revolves around clarifying the distinction between legal identity and digital ID. This discussion takes place both online and at RiceCon, and the community perceives productive progress. The incorporation of safeguards and remedies is central to this ongoing debate.

It is important to note that there have been misunderstandings regarding civil society’s approach to digital identity systems. Therefore, it is necessary to clarify the difference between legal identity and digital ID. The speaker does not oppose digital IDs but emphasizes the need for appropriate safeguards to protect individuals’ rights.

In summary, the organization is a global coalition of civil society with diverse membership and approaches. They have transitioned to a proactive approach towards digital identity systems, and prioritize multilateral engagement and national level advocacy. The ongoing discussion revolves around clarifying the distinction between legal identity and digital ID while highlighting the importance of safeguards and remedies.

Laura Bingham

Strategic litigation has generated significant interest within civil society communities. To address this, a strategic litigation training workshop has been organized. The decision to hold this workshop was influenced by a heat mapping exercise conducted by the organization, which likely revealed a high demand for knowledge and expertise in this area.

In addition, the concept of ‘Digital ID done right’ was discussed, highlighting its dynamic nature. It was emphasized that Digital ID implementation should not be seen as a one-time event but rather an ongoing process that requires constant monitoring and adaptation to local, national, and regional contexts. This recognition acknowledges the evolving nature of society and the need for digital identification systems to respond accordingly.

Moreover, the importance of incorporating frameworks for ongoing feedback was emphasized. It was suggested that these frameworks are crucial in addressing exclusion and rectifying any issues that may arise during the implementation of Digital ID systems. By continuously seeking feedback from individuals affected by these systems, organizations can ensure they are inclusive and responsive to the needs of all stakeholders.

In conclusion, strategic litigation has garnered significant interest within civil society communities, leading to the organization of a dedicated training workshop. Furthermore, the concept of ‘Digital ID done right’ recognizes the need for constant monitoring and adaptation to effectively respond to evolving societal dynamics. Incorporating feedback frameworks is crucial to ensure the inclusivity and effectiveness of Digital ID systems.

Speaker 2

The coalition’s initiative in Costa Rica involves conducting an exercise to map the needs and capabilities of its members with the aim of facilitating knowledge sharing and capacity building. This initiative is driven by the recognition that effective collaboration and partnerships are essential in achieving the goals outlined in SDG 17: Partnerships for the goals.

Through this mapping exercise, the coalition has sought to identify a balance between the expertise that exists within its member organizations and the areas where development is needed. The exercise was successful in pinpointing the strengths and needs of the coalition’s members, providing valuable insights to guide future actions.

The mapping exercise revealed that some members excel in research fields such as discrimination, economic and social rights, privacy and data protections. On the other hand, there were identified needs in areas such as comparative examples, collective actions, surveillance fields, transparency, and access to information. This comprehensive understanding of the capabilities and gaps within the coalition’s organizations is crucial for effective collaboration and targeted capacity-building efforts.

In light of these findings, the coalition has encouraged its members to support each other by sharing their expertise and learning collectively. By populating the cells according to their strengths and needs, the members can better grasp the areas where support can be given and received. This collaborative effort aims to build capacity and address the identified needs collectively, enhancing the overall effectiveness of the coalition in working towards its goals.

Overall, the mapping exercise conducted by the coalition in Costa Rica has provided valuable insight into the needs and capabilities of its member organizations. By leveraging the strengths and expertise of its members and addressing the identified needs through collaborative learning, the coalition is well-positioned to make significant progress towards its objectives. This initiative demonstrates the power of partnerships and knowledge sharing in achieving the goals set forth in SDG 17.

Speaker 4

The Multilateral Working Group is a dedicated initiative that aims to enhance expertise building on a global scale while ensuring more strategic and coordinated engagement in multilateral forums. The group’s primary focus is on providing training related to technology, science, and standards, equipping members with the necessary knowledge and skills to effectively participate in these international platforms. This approach not only increases the group’s collective understanding of these subjects but also enables them to actively contribute to global development and problem-solving.

In addition to knowledge-building initiatives, the Multilateral Working Group also plays a crucial role in facilitating the participation of its members in international forums. They recognise the importance of having a diverse range of voices and perspectives in these discussions and, therefore, provide funding to support the presence of more members. This financial assistance ensures that individuals from various national contexts can actively engage and contribute to multilateral forums, enabling a more inclusive and comprehensive dialogue.

Another important aspect highlighted in the analysis is the significance of collective efforts in addressing issues related to identification systems. The importance of this collective approach was emphasised by the community involved in the study. They stressed the need for a unified and collaborative approach, acknowledging that tackling such complex issues requires the collective knowledge, skills, and resources of a diverse group of individuals and organisations.

To support this collective effort, the community developed a toolkit aimed at digital rights activists. This toolkit provides valuable insights into the intricate complexities associated with identification systems. Its purpose is to aid advocacy, mobilisation, and education on this topic. By equipping activists with a deeper understanding of identification systems, the toolkit empowers them to effectively advocate for policies and practices that align with the principles of peace, justice, and strong institutions, as outlined in SDG16.

In conclusion, the Multilateral Working Group’s focus on expertise building and strategic engagement in multilateral forums highlights their commitment to global collaboration and problem-solving. By providing training on important subjects and facilitating diverse participation in international platforms, the group aims to enhance the collective knowledge and impact of their members. Furthermore, the emphasis on the importance of collective efforts in addressing identification systems showcases the community’s dedication to promoting peace, justice, and strong institutions. The development of a toolkit further supports this objective by empowering activists to advocate for positive change in this area.

Moderator

The analysis of the provided information highlights several important points made by the speakers during the discussion. Firstly, it is noted that the Internet Governance Forum (IGF) community has made significant progress since the last meeting. This progress includes the development of a structured framework, regular communication, and the identification of thematic areas. These advancements suggest a more organized and coordinated approach within the IGF community.

The community places great importance on deliberate and intentional learning, leveraging each other’s strengths, and identifying gaps and opportunities. They have conducted exercises such as mapping the needs and capabilities of members to identify areas for knowledge sharing and influence. By focusing on capacity building in areas with greater needs, they aim to create a supportive and collaborative environment.

In terms of their focus, the community is working on two thematic groups: one focusing on national-level interventions and the other on multilateral engagement. This demonstrates their commitment to addressing different aspects and levels of digital identification issues.

The World Bank has advocated for the use of an entity system in countries facing various problems. However, it is important to note that digital ID should not be conflated with legal identity, as they serve different purposes. The community recognizes the need for disentanglement between these two concepts and is working towards achieving a common understanding.

The engagement in multilateral forums, particularly in the context of ID4D, has presented challenges. There have been both online conversations and discussions at events like RiceCon. However, misunderstandings in approach have been observed, emphasizing the complexities involved in addressing digital identity system issues at a global level.

Strategizing public interest litigation has been seen as an effective approach to address multinational and national issues related to digital identification. The analysis reveals that countries like Uganda are interested in learning from Kenya’s experiences in working on digital identification issues. Furthermore, the community’s engagement with civil societies and organizations from India and Jamaica showcases the potential for cross-country collaboration.

The analysis also emphasizes the importance of constant oversight and updates in socio-technical systems like digital ID. These systems need to adapt and evolve along with societal changes and should have mechanisms in place for feedback and addressing exclusions and other issues.

Public involvement and collaboration are encouraged for the development and maintenance of digital public infrastructure (DPI) and digital services. By involving the public, UN agencies can be held accountable, promoting a more transparent and inclusive approach.

The use of open-source technology in government systems is suggested as a way to develop secure, trusted, and effective systems. Open-source technology allows for a deeper understanding of how systems operate and enables technical communities from different countries to contribute to their development. It is considered a key solution to address ongoing challenges faced by countries in their digital systems.

In conclusion, the analysis highlights the progress made by the IGF community in terms of structure, communication, and thematic areas. It also emphasizes their deliberate approach to learning, collaboration, and capacity building. The recognition of the need for disentanglement between legal identity and digital ID, as well as the challenges in multilateral engagement, are notable observations. The effectiveness of strategic litigation in addressing digital identification issues at various levels is also highlighted. Finally, the analysis underscores the importance of constant oversight and updates in socio-technical systems, as well as the value of public involvement and the use of open-source technology in government systems.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Encryption’s Critical Role in Safeguarding Human Rights | IGF 2023 WS #356

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Sharon Polsky

Encryption plays a vital role in maintaining confidentiality and privacy across various sectors, including law and healthcare. Lawyers, doctors, and policymakers rely on encryption to safeguard sensitive information and prevent unauthorized access. The positive sentiment towards encryption is driven by its crucial role in protecting client confidentiality and patient privacy. Encrypted communications ensure secure strategy discussions for lawmakers and policy analysts.

Another important argument supporting encryption is the universal need for privacy, whether it is for personal, business, or national security purposes. Encryption is viewed as a fundamental tool that helps individuals protect their privacy. This positive sentiment emphasizes the significance of maintaining encryption as a fundamental aspect of upholding privacy rights.

However, there are concerns about the lack of understanding of technology implications in legislation. The negative sentiment surrounding this issue suggests that uninformed legislation can lead to unintended consequences. Many people use technology without fully comprehending its intricacies, including lawmakers and policymakers. This lack of education and understanding poses challenges in creating effective and well-informed legislation.

Child protection is a pressing concern, but the negative sentiment arises from the concern that laws aimed at protecting children through breaking encryption could result in harmful consequences. These laws might create vulnerabilities in encryption, potentially endangering everyone’s privacy. Furthermore, it is argued that children reporting abuse might be mistakenly flagged as suspects if encryption is compromised.

The need for lawmakers to have a correct understanding of the technology they regulate is highlighted. The negative sentiment stems from the observation that many current lawmakers lack a thorough understanding of encryption technology. Some members of parliament come from non-technical backgrounds, which hinders their ability to comprehend the nuanced aspects of encryption.

Canadian legislation, such as Bill C-18 and Bill C-26, has raised concerns about potential infringements on privacy and freedom. Negative sentiment arises from the observation that these laws allow Canada to govern internet content globally. This broad regulatory reach can undermine privacy and freedom, raising questions about the potential overreach of government intervention.

It is also worth noting that other platforms outside Canada may face challenges in complying with Canadian legislation, as they are not bound by the Canadian Charter that protects individuals against government overreach. This negative sentiment stems from the observation that foreign companies are forced to execute censorship measures, which may conflict with their existing policies and obligations.

The importance of regulators having a proper understanding of what they regulate is emphasized. This positive sentiment highlights the criticalness of regulating technology with a thorough understanding of its impacts and consequences. Sharon Polsky’s argument supports the need for regulators to possess comprehensive knowledge of the technologies they oversee.

Education is proposed as a long-term solution to bridge the gap in understanding technology implications. The positive sentiment suggests that starting from the youngest grades, education should include topics like laws, political structures, and critical decision-making related to technology. This approach aims to equip future generations with the knowledge to create effective legislation and understand the potential risks associated with technology.

Tech companies are criticized for prioritizing shareholder returns over user privacy. The negative sentiment arises from the observation that corporations primarily focus on maximizing profits for shareholders. The promise to prioritize user privacy is viewed as unreliable, as companies are seen as bound to eventually fail in protecting user privacy.

There is a growing awareness among the general public about the monetization of personal information. This positive sentiment suggests that people have become increasingly frustrated with seeing their personal information being used for financial gain. The expectation is that individuals should have control over their personal information and how it is used.

In conclusion, encryption is seen as an essential tool for maintaining confidentiality and privacy in various sectors, but there are concerns about the lack of understanding of technology implications in legislation. The legislation aimed at protecting children through breaking encryption has raised concerns about potential unintended consequences. Education is proposed as a long-term solution, and there is an increasing focus on the need for regulators and policymakers to possess a comprehensive understanding of technology. Tech companies are criticized for prioritizing shareholder returns over user privacy, and individuals are becoming more aware of the monetization of their personal information. The expectation is that companies will have to adapt their practices to meet the demand for better privacy control.

Rand Hammoud

Encryption is widely regarded as crucial for ensuring online security, safety, and trust. It plays a vital role in safeguarding human rights by providing a secure means of communication and organization for activists, lawyers, and human rights defenders. These individuals rely on encryption to protect their freedom of expression and assembly.

However, concerns have been raised regarding the vulnerability of encryption to exploitation by the surveillance industry. It has been argued that these vulnerabilities are harnessed by a billion-dollar surveillance industry, leading to human rights abuses such as enforced disappearances and extrajudicial killings. Such abuses pose significant risks to activists, undermining their ability to protect their rights.

Governments often assert that undermining encryption is necessary for national security. However, there is widespread fear that such actions would make surveillance cheaper and easier, potentially resulting in privacy infringements. There is growing use of spyware against human rights activists and journalists, highlighting the urgency to ban spyware vendors and technologies associated with human rights abuses. Spyware is unregulated and unchecked, and despite the existence of legal frameworks branding surveillance as illegitimate, it continues to be used.

Existing international standards already render surveillance capabilities invasive. The argument that law enforcement requires spyware to maintain national security and safety is contested, as there is no evidence to support its effectiveness in these areas. On the contrary, there is ample evidence indicating that spyware infringes upon individuals’ rights and diminishes their safety.

Undermining encryption is tantamount to assuming everyone is guilty until proven innocent, fundamentally contradicting the existing surveillance system. This highlights the need for an international framework to define surveillance and encryption. Such a framework should be aligned with the spirit of existing rights protections, fostering greater accountability and transparency.

However, advocating for the use of surveillance technologies in autocratic governments presents its own challenges. Limited advocacy avenues and the difficulty in implementing rights-respecting frameworks in such contexts hinder progress in this area. On a contrasting note, economic arguments can be employed to protect the economic advantages of certain companies.

Overall, there is a pressing need for a more comprehensive, global, and international framework governing the use of surveillance technologies. Given the borderless nature of technology, jurisdiction-dependent regulations are inadequate. By establishing clear guidelines and regulations, a more balanced and accountable approach can be adopted, ensuring the protection of human rights and promoting global security.

In conclusion, encryption is integral to online security and the protection of human rights. However, the vulnerabilities of encryption and the misuse of surveillance technologies pose significant risks to individuals and their rights. Upholding encryption and establishing a global, rights-based framework for surveillance technologies are crucial steps to safeguarding privacy, enhancing accountability, and preserving fundamental rights in the digital age.

Tate Ryan-Mosley

This analysis explores various arguments regarding end-to-end encryption and backdoor access. Advocates emphasise the importance of end-to-end encryption in ensuring internet security, particularly in messaging apps like Signal, Telegram, and WhatsApp. These apps employ end-to-end encryption to safeguard user data, ensuring that only the intended recipients can access and decipher messages. Notably, tech companies that create such encrypted apps do not possess decryption keys, enhancing their security.

On the contrary, critics argue that creating a backdoor to encryption would compromise its security. They contend that establishing a master key or any form of backdoor access would be challenging to control, potentially enabling misuse by bad actors or governments. Tech companies vehemently oppose compromising encryption security, as weakening it could have significant implications for user privacy and data protection.

The United Nations (UN) supports strong encryption and concurs with those who assert that encryption backdoors contravene freedom of expression. The UN underscores the imperative nature of robust encryption to enable human rights advocates and journalists to function securely, preserving confidentiality and security.

Lawmakers are currently grappling with the task of addressing harmful online content moderation while maintaining encryption security. They are deliberating ways to gain access to secure communication channels, particularly given the increasing migration of internet users to private platforms like messaging apps. This shift has made monitoring and preventing the dissemination of abusive or harmful information more challenging.

Furthermore, it is essential for lawmakers to possess accurate knowledge of technology to prevent unintended consequences in their legislation. A pertinent example is the scrutiny of the UK online safety bill and similar legislation in Canada, which may inadvertently compromise encryption in an effort to safeguard children. Concerns have been raised that such well-intentioned legislation could endanger everyone, including children, by enabling unauthorized access through encryption backdoors.

Alongside discussions on encryption and backdoor access, the analysis highlights the media’s coverage of non-Western countries. It argues that the press should strive for better representation and reporting of international stories, acknowledging issues such as biases and racism that can influence media coverage. The press is encouraged to maintain openness to improvement and be accountable for their reporting.

In conclusion, the analysis underscores the crucial role of encryption in internet security, while emphasizing the need to strike a balance between public safety and preserving privacy and human rights. It underscores the significance of encryption in protecting free speech, human rights, and the work of journalists. It also highlights the necessity for lawmakers and the press to possess a comprehensive understanding of technology to make informed decisions and enhance their practices.

Roger Dingledine

The discussions revolved around the topic of encryption and privacy, specifically examining their impact on society. Encryption was highlighted as a vital tool that allows individuals to have control over their personal information, offering them the ability to determine who can access their data and ensuring a sense of privacy and security. It was particularly emphasised that encryption is invaluable for vulnerable groups such as minorities and human rights activists, as it plays a crucial role in ensuring their safety.

However, the proposal for backdoor access to encryption was strongly rejected. The argument put forth was that incorporating a backdoor feature in encryption would undermine the entire concept, compromising the safety of everyone. It was emphasised that if a mechanism to break encryption is created, it can be exploited anywhere in the world, regardless of the country, leading to potential misuse. This raised concerns about the weakening of society and the possible dangers associated with backdoors in encryption.

The discussions also highlighted the intrinsic connection between security and privacy. It was argued that security and privacy are essentially two sides of the same coin, both being crucial aspects of individuals’ lives. Instances of identity theft were cited to illustrate the intertwining nature of security and privacy. Furthermore, the reliance of FBI agents, who play a significant role in maintaining security, on tools like TOR was mentioned, underscoring the importance of both security and privacy in their work.

Another significant point of discussion was the adverse effects of false positives generated by automated content moderation tools. It was highlighted that AI-powered systems are not infallible and can produce false positives. This means that innocent users may be falsely reported and labelled as criminals due to errors in content moderation. The potential consequences of such misreporting were stressed, as they can have serious implications and ruin lives.

The discussions also touched upon the unrealistic expectations of politicians who desire technological solutions that provide both privacy and enable surveillance. It was argued that such a solution is currently not technologically feasible and can potentially result in exploitation. Tech companies were criticised for deceiving governments by promising to develop such technology for significant sums, despite its impossibility. The need to strike a balance between privacy and surveillance was emphasised, particularly considering the long-term effects of compromising safety.

Regarding specific tools, the discussions highlighted the significance of encryption in Tor. It was mentioned that Tor is not solely for resisting surveillance but also for resisting censorship. The widespread use of tools like Tor was deemed vital for their effectiveness and safety. It was emphasised that as more common tools incorporate real encryption, it becomes a normal part of everyone’s daily life, rather than being perceived as a sign of political dissent.

Additionally, the discussions raised concerns about the compromising stance of some tech companies on privacy. It was noted that certain tech companies prioritise profit over users’ privacy rights, especially when accessing large markets like China, Russia, Saudi Arabia, and India. This practice was criticised as it enables dangerous actions against user privacy.

In conclusion, the discussions on encryption and privacy shed light on the importance of encryption in safeguarding personal information and the need to have control over its access. The idea of backdoor access to encryption was strongly rejected, highlighting its potential for misuse and the weakening of society. The inherent connection between security and privacy was underscored, with a particular focus on the negative consequences of false positives from automated content moderation tools. The unrealistic expectations of politicians in balancing privacy and surveillance were criticised, while the importance of widespread use of tools like Tor was emphasised. The compromising stance of certain tech companies on privacy for market access was also challenged. Overall, the discussions provided insights into the complex and multifaceted nature of encryption and privacy in contemporary society.

Speaker

The analysis reveals that companies often fail to prioritize privacy, despite claiming to do so. This can be attributed to their primary focus on maximizing returns for shareholders, which raises concerns about the genuine value placed on privacy in corporate decision-making.

Another pressing concern is the negative impact of cybercrime and spyware on economies. Billions of dollars are lost to cybercrime each year, with industry statistics supporting these claims. Moreover, the economic damage caused by cyber threats can surpass the economies of certain nations, emphasizing the need for effective measures to combat cyber threats and protect against economic losses.

On a more positive note, it is acknowledged that Artificial Intelligence (AI) has the potential to contribute positively, particularly in the field of medical advancements. The application of AI in healthcare can drive innovation, improve patient outcomes, and enhance overall well-being. This suggests that if properly harnessed, AI technology could play a significant role in advancing healthcare and addressing societal challenges.

In light of the alarming statistic that millions of people’s genetic identities have been compromised through privacy breaches, it is concluded that government action is imperative. Government intervention is needed to protect individuals’ privacy rights, maintain the integrity of sensitive data, and establish robust regulations that hold companies accountable for any lapses in privacy protection.

In summary, the analysis highlights the tendency of companies to overlook privacy concerns in their pursuit of maximum shareholder returns. The negative impact of cybercrime and spyware on economies serves as a wake-up call, emphasizing the need for comprehensive cybersecurity measures. While opportunities for positive contributions through AI exist, safeguarding privacy must remain a priority. Ultimately, government action is necessary to address privacy breaches, protect individuals’ data, and safeguard the interests of society as a whole.

Smith

The speaker at the event politely requested participants to form a queue at the microphone and introduced herself. She emphasized the limited time remaining and expressed the desire to address both of the upcoming questions within the given timeframe. The speaker’s request for concise questions was to ensure enough time for comprehensive answers. Additionally, the importance of participants introducing themselves before posing questions was highlighted, fostering respect and engagement.

As the queue formed, there was a sense of urgency to address the remaining questions. With only one minute left, the speaker urged the next person in line to promptly ask their question to not miss the chance for a response. This showcased the speaker’s commitment to effectively addressing all inquiries before the session ended.

In conclusion, the speaker’s management of the Q&A session demonstrated professionalism, consideration, and a strong focus on maximizing the remaining time to accommodate participants’ questions.

Audience

During the discussions, various important topics were explored, shedding light on the challenges and complexities surrounding technology, human rights, privacy, and accountability.

One significant point of discussion was the danger posed by encrypted apps in countries with authoritarian regimes. It was argued that the use of encrypted apps can actually endanger users in such countries. The Turkish government was cited as an example, using the presence of encrypted apps as evidence against individuals, highlighting the fact that autocratic nations often learn and adopt oppressive policies from each other. The call was made to consider the context and oppressive governmental practices when assuming the safety of encrypted apps for all users globally.

The biased media coverage of technological issues and human rights abuses was also extensively addressed. It was argued that Western-centric media tends to give more attention to issues in Western countries. Non-Western governments’ tech requests or laws often do not receive as much coverage, despite the potential replication of policies in similar geopolitical contexts. The need for a more global perspective in technology and human rights reporting was emphasized.

The lack of accountability for big tech companies in their interactions with autocratic nations was another key concern. It was pointed out that big tech compliance in autocratic governments is increasing, and these companies are often willing to compromise on human rights for financial gain. There was a call for increased scrutiny and accountability to ensure that these companies are held responsible for their actions in autocratic nations.

The potential for mandated encryption backdoors was also raised, particularly in the context of the UK’s online safety bill. One audience member expressed concern about this possibility and the implications it may have for privacy. The stance was against the implementation of mandated encryption backdoors.

Surveillance capitalism, the practice of tech companies using user data for profit, was identified as a concerning aspect of privacy. It was acknowledged that while governments are mostly blamed for surveillance, tech companies also play a significant role in exploiting user data for financial gain.

The rights of victims of child sexual abuse material (CSAM) were highlighted as often being overlooked. This raised the issue of the need for greater attention and support for victims of such abuse.

The discussion also revealed that, in many cases, tech companies prioritize their revenues over human rights. It was pointed out that companies encrypt data extracted from users primarily to prevent competitors from accessing it, rather than for the protection of user rights.

Double standards in abiding by privacy laws were identified as a problem. Tech companies were found to comply with laws in autocratic states but often ignore those in democratic states, indicating a lack of consistent and ethical practices.

The potential cybersecurity risks associated with data encryption on internet protocols were highlighted. It was argued that the inappropriate use of encryption can weaken cybersecurity, emphasizing the need for careful consideration and implementation.

Finally, the importance of adapting advocacy messaging to different regions was raised. It was noted that different parts of the world may require tailored approaches to effectively communicate and advance human rights and justice.

In conclusion, these discussions shed light on the complex issues surrounding technology, human rights, privacy, and accountability. They highlighted the dangers of encrypted apps in authoritarian regimes, the biased media coverage of technological issues, the need to hold big tech companies accountable, concerns about privacy and surveillance capitalism, overlooked rights of CSAM victims, tech companies prioritizing revenue over human rights, double standards in privacy laws compliance, potential cybersecurity risks of encryption, and the importance of adapting advocacy to different regions. These discussions call for greater awareness, scrutiny, and efforts to ensure the protection of human rights, privacy, and justice in the rapidly evolving digital landscape.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Education, Inclusion, Literacy: Musts for Positive AI Future | IGF 2023 Launch / Award Event #27

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Siva Prasad Rambhatla

The analysis highlights various important aspects relating to the impact of technology on education. Firstly, it emphasizes that technology is a medium that is guided by humans, and it has proven to be extremely useful in facilitating education during the COVID-19 pandemic. The supporting facts provided in this regard include the fact that humans play a crucial role in feeding into technology and guiding its development. Moreover, it is acknowledged that technology has been instrumental in enabling educational continuity while traditional in-person learning has been disrupted.

However, another significant finding of the analysis is the existence of a digital divide that poses challenges to education. This digital divide is characterized by disparities in access to technology and online education resources. The research highlights the fact that not everyone has access to the necessary equipment and broadband connectivity, thereby hindering their ability to fully participate in online learning. An illustrative example is given where students had to resort to climbing trees to receive internet signals. This digital divide is particularly pronounced during the COVID-19 pandemic and it disproportionately affects individuals from disadvantaged backgrounds, exacerbating existing inequalities.

To address the educational needs and promote inclusivity, it is argued that education should be more inclusive, multicultural, and locally relevant. The analysis stresses the importance of adopting AI learning models that are designed to be inclusive of diverse perspectives and cultures. Furthermore, it highlights the need to recognize that subject learning cannot be universal and should be tailored to the specific cultural contexts and needs of different communities.

The analysis also sheds light on the challenges posed by generative AI, particularly in the context of copyright and plagiarism. It is pointed out that generative AI technology has the potential to bypass traditional learning processes and facilitate easy content generation, which can have negative consequences on the creative thinking ability of learners. This aspect raises concerns about copyright infringement and plagiarism, indicating the need for safeguards and ethical considerations in the use of generative AI in education.

On a positive note, the research suggests that AI technology can fill gaps in the shortage of teachers and instructors, and it also provides opportunities for innovative course design. However, it is emphasized that the design and implementation of AI technology should be approached with caution to fully harness its potential. This implies considering ethical implications, promoting transparency, and ensuring proper oversight to mitigate potential risks and biases that may be embedded in AI algorithms.

The analysis underscores the existence of a real and persistent digital divide, which is influenced by socioeconomic and cultural factors. It is observed that individuals with access to infrastructure and resources benefit more from digital advancements, while socioeconomic and cultural backgrounds contribute to the perpetuation of this divide. The presence of international groups is found to slightly reduce this divide, indicating the potential of collaboration and global initiatives to address the issue.

It is also highlighted that biases and discrimination in AI algorithms pose a significant challenge. The analysis acknowledges the existence of biases and discrimination in AI algorithms and emphasizes the need to address these concerns. The research does not provide specific supporting facts in this regard, but it implies that efforts should be made to identify and rectify biases to ensure fair and equitable outcomes.

A noteworthy observation from the analysis is the importance of governmental intervention and the involvement of private firms in bridging the digital divide and countering exclusions and biases. The research suggests that governments and private firms should invest in initiatives to reach larger sections of society and ensure that technology is accessible to all, regardless of their socioeconomic or cultural background. This would require strategic planning, substantial investment, and collaborations between various stakeholders to create a more inclusive and equitable educational landscape.

Finally, the analysis highlights the need for academics to propose alternatives to address biases in the digital medium. Further research and discussions are needed to explore innovative approaches and strategies that can mitigate biases and promote fairness in the use of technology in education.

In conclusion, while technology has played a valuable role in education, it is important to address the challenges posed by the digital divide, generative AI, biases in AI algorithms, and the need for inclusivity and local relevance. Governments, private firms, and academics all have a crucial role to play in ensuring that technology is harnessed ethically and equitably to enhance access to quality education for all.

Renata de Oliveira Miranda Gomes

The presence of digital platforms has significantly increased in higher education, particularly during the COVID-19 pandemic. These platforms have incorporated artificial intelligence (AI) to revolutionise the learning process and facilitate new ways of exchanging knowledge. One such tool, chat GPT, has emerged as a valuable resource in enhancing learning experiences.

The speakers highlight the advantages of incorporating digital platforms and AI in higher education. Firstly, the ease of access and availability of digital platforms have made learning more accessible, especially during the pandemic when in-person classes were disrupted. Additionally, the incorporation of AI has allowed for innovative learning methods and the exploration of new ways to deliver educational content.

One of the major concerns expressed is the gap between students and educators in accepting these new platforms. Some resistance stems from the fear that these platforms may facilitate plagiarism or promote shortcuts in assignments. However, this stance is neutral, indicating a need for further dialogue and understanding between students and educators to address these concerns effectively.

Despite the concerns raised, chat GPT emerges as a promising tool for learning. It has the potential to save time by generating bullet point summaries or highlights of reading material. Moreover, its use can foster the development of critical thinking and analytical skills among students.

The speakers emphasize the importance of collaboration between educators and students in the effective use of AI in education. They highlight the significance of users influencing AI’s functionality and tailoring it to meet specific learning requirements. This collaboration can lead to a more beneficial and effective integration of AI in education, ensuring its positive impact on achieving SDG 4: Quality Education.

Furthermore, the inclusion of AI in initial learning processes is seen as an important step towards transforming education. The state of Piauí in Brazil has taken a notable stride by including AI in its high school curriculum, making it the first state in Brazil to do so. This initiative demonstrates the potential for AI to enhance teaching and learning methodologies at an early stage.

Overall, the speakers express a positive sentiment towards incorporating digital platforms and AI in education. They acknowledge the potential benefits of these technologies in improving access to quality education and fostering a more innovative and effective learning environment. With further collaboration, dialogue, and understanding, the successful integration of AI in education can be realised, ultimately contributing to the achievement of SDG 4: Quality Education.

Lee Rainie

Elon University is taking a stand in upholding the essential principles for the Internet and Artificial Intelligence (AI), which are crucial for safeguarding human rights, autonomy, and dignity. The university is diligently following these principles, which bring time-tested truths to the age of AI. By doing so, they ensure that the development and use of AI technology align with ethical considerations and respect for individual freedoms.

As the influence of AI spreads, universities like Elon recognize the need to study and disseminate insights about how this technology impacts people. They understand that AI is rapidly surpassing our cognitive capacities and becoming a prominent part of our lives. Therefore, it is essential for higher education institutions to promote new literacies and best practices to empower individuals and equip them with the necessary skills to navigate this AI-driven world.

In the age of AI and smart technologies, human traits such as critical thinking, sophisticated communication, teamwork, and emotional resilience are becoming increasingly valuable. These unique qualities distinguish humans from AI and need to be honed. Universities like Elon acknowledge this and emphasize the importance of identifying and exploiting these distinctively human traits and talents. By doing so, individuals can find their place in a world where AI is becoming more integrated into various aspects of society, including the workforce.

It is crucial to recognize that AI should serve humans and not the other way around. This principle is advocated by experts like Mr. Rainie, who emphasizes the importance of domesticating technologies to serve our needs and enhance the well-being of individuals and communities. Acknowledging and implementing this principle ensures that AI technology is developed and utilized in a manner that prioritizes and respects the interests, autonomy, and dignity of human beings.

In conclusion, Elon University’s commitment to upholding the principles for the Internet and AI is commendable. Their efforts in studying the impact of AI on society and promoting new literacies and best practices are crucial in preparing individuals for an AI-driven future. Recognizing the distinctively valuable human traits in the age of AI and advocating for AI technology to serve humans are essential for maintaining a balance between technological advancement and human well-being.

Audience

The discussion centered around the use of Artificial Intelligence (AI) in education and its potential impact. One argument highlighted the gap in expectations between university administrators and students regarding the use of AI. The law faculty at Leiden University expressed opposition to AI implementation, revealing a negative sentiment. On the other hand, the argument in support of using AI with caution emphasized proper attribution and the need to address misinformation. It advocated for alerting students about the dangers of misinformation and displayed a positive sentiment towards AI in education.

Another concern raised during the discussion focused on the potential for AI to worsen the digital divide, particularly among marginalized groups. This concern was exemplified by the significant digital disparities in countries like Bangladesh. It was feared that AI would primarily benefit technologically advanced individuals, further marginalizing those without access. This argument conveyed a negative sentiment towards AI, suggesting that it could exacerbate inequalities.

The discussion also emphasized the importance of embracing technology in education and ensuring AI is accessible for lifelong learning and marginalized groups. It stressed the need to integrate AI in lifelong learning while addressing the challenges faced by certain demographics in accessing AI-based public services. This perspective showed a positive stance towards AI, advocating for inclusivity and reduced inequalities.

Additionally, the lack of sensitivity and ethical standards in AI development by STEM professionals was criticized. The argument highlighted a negative sentiment towards the apathy or lack of interest among STEM workers in developing AI ethically. This raised concerns about the ethical implications of AI development and the need for stringent ethical standards.

Furthermore, there was a call for diversifying AI engines beyond corporate control. This view expressed a neutral sentiment, advocating for the exploration of open-source alternatives and diversification of AI engines. The aim was to move away from the dominance of corporate entities in AI development.

In conclusion, the discussion on AI in education highlighted various arguments and concerns. While there was an expectation gap between university administrators and students regarding AI, there was also support for using AI with caution and proper attribution. The potential exacerbation of the digital divide and the importance of inclusivity and accessibility in lifelong learning were significant considerations. Additionally, the lack of sensitivity and ethical standards in AI development by STEM professionals raised concerns. There was also a call for diversifying AI engines beyond corporate control. These insights shed light on the complex considerations and diverse opinions surrounding the use of AI in education.

Connie Book

In their discussion, the speakers emphasise the importance of taking into account human well-being and inclusivity in the face of artificial intelligence (AI) advancements. They argue that while AI can bring about many benefits and innovations, the focus must always be on the welfare of individuals and society as a whole. To achieve this, they stress the need for strong policies and regulations to guard against the negative consequences that AI can potentially have.

The speakers advocate for digital inclusion, asserting that access to AI technologies should be a right for all, particularly within educational institutions. They believe that universities and colleges play a crucial role in ensuring that AI is not only accessible to everyone but also integrated into the educational curriculum. They call on the higher education community to become active advocates for digital inclusion, providing opportunities for individuals to gain knowledge and understanding about AI.

Furthermore, the speakers assert that teaching and learning are experiencing significant transformations as a result of AI. They highlight the importance of academic leaders in shaping these changes by creating policies and designing new approaches to education that incorporate AI technologies. Faculty members are encouraged to adapt to these advancements and collaborate in the development of innovative teaching methods.

The need to prepare learners for the ongoing AI revolution is another key point addressed by the speakers. They stress that education must go beyond imparting theoretical knowledge and focus on equipping individuals with practical skills that enable them to adapt to the rapidly changing landscape of AI. They believe that by fostering a mindset of lifelong learning and providing hands-on experiences, individuals can be better prepared for the challenges and opportunities brought about by AI.

In conclusion, the speakers highlight the importance of prioritising human well-being, inclusivity, and education in the era of AI. They call for the implementation of strong policies, digital inclusion, and collaboration within the educational community to ensure that AI advancements benefit everyone and do not leave anyone behind. They urge universities and colleges to lead the way in incorporating AI technologies into the curriculum and preparing learners for the ever-evolving AI landscape. By doing so, they believe that individuals can be empowered to thrive in a world marked by accelerated change and innovation.

Francisca Oladipo

The analysis focused on several key aspects of artificial intelligence (AI) and its impact on education, ethics, policy-making, diversity, and continuous learning. The speakers argued for the role of universities in providing a comprehensive AI education that goes beyond technical skills. They stressed that AI students should be encouraged to study subjects like philosophy, finance, healthcare, and social sciences to develop a well-rounded understanding of AI’s applications in various fields.

In terms of ethics, the speakers acknowledged the importance of safeguarding against the abuse and misuse of AI. They emphasized the need to promote ethical AI practices and educate individuals on the ethical implications of AI. It was suggested that ethical AI education should be incorporated into AI curricula and training programs to ensure that future AI professionals possess the knowledge and skills to develop responsible AI solutions.

Another key point raised during the analysis was the importance of engaging with policymakers. The speakers highlighted the need for continuous advocacy to effectively communicate the potential benefits and challenges of AI to policymakers. They also stressed the need for collaboration between AI experts and policymakers to develop responsible AI governance frameworks that address societal concerns and ensure the ethical and safe use of AI technologies.

Promoting diversity and inclusion within the AI field was another noteworthy argument made by the speakers. They highlighted that AI has applicability across all fields and is not limited to computing. Thus, it was suggested that the AI field should be more inclusive and diverse, encouraging participation from individuals with diverse backgrounds and perspectives. The speakers emphasized the importance of including arts and humanities in AI education to foster social good and ensure that AI technologies benefit all segments of society.

Lastly, the speakers underscored the significance of continuous learning in the rapidly evolving landscape of AI. They pointed out that AI is evolving rapidly, and professionals in the field must keep pace with the latest advancements and developments. Continuous learning was identified as a key factor in staying updated and maintaining the relevance of AI professionals.

In conclusion, the analysis highlighted the multifaceted dimensions of AI education, ethics, policy-making, diversity, and continuous learning. The speakers advocated for universities to play a central role in providing comprehensive AI education, incorporating ethics into AI curricula, engaging with policymakers for responsible AI governance, promoting diversity and inclusion in the field, and emphasizing the importance of continuous learning to keep abreast of the evolving AI landscape.

Wei Wang

The analysis provides a comprehensive overview of the implications of artificial intelligence (AI) and emphasizes the necessity for legal considerations. One of the key findings is Wei Wang’s research, which primarily focuses on global AI governance. Wang’s work acknowledges the crucial impact of AI on higher education and underscores the need for legal frameworks to address this issue.

Another critical aspect highlighted in the analysis is the data supply chain of AI, which intersects with three legal areas. Data protection emerges as a priority, as AI services rely on personal data for training. The analysis mentions that investigations have been conducted globally to examine the use of personal data by AI services. Notably, Italy has been at the forefront of such inquiries.

Furthermore, AI services raise concerns regarding research integrity and content safety. The analysis points out the challenges posed by fake citation links in AI services, which can compromise the credibility of research findings. Additionally, there are worries about the use of unverified information in machine learning processes. These concerns highlight the need for safeguards to maintain the integrity of research and ensure content safety.

The analysis also draws attention to the impact of AI services on copyright law. Specifically, it argues that AI services challenge our traditional understanding of fair use. Litigation experiences related to AI services have raised questions about the fairness of generative AI services in terms of copyright infringement. This observation underscores the need to reevaluate and adapt existing copyright laws to keep pace with advancements in AI technology.

In conclusion, the analysis highlights the importance of legal considerations in relation to the implications of AI. It emphasizes the need for data protection, research integrity, content safety, and fair use in copyright law. These findings provide valuable insights into the various legal aspects that must be addressed to harness the benefits of AI while ensuring ethical and responsible AI practices across diverse domains.

Divina Frau-Meigs

The speakers in this discussion emphasise several key points about AI. Firstly, they argue that there is a need to resist the panic and fear surrounding AI systems and the possibility of them developing super intelligence that surpasses human intelligence. Instead of succumbing to these concerns, they advocate for a human-centred approach to AI development. By keeping humans at the focus of AI technology, it can be harnessed to benefit society rather than posing a threat.

Moving on, the speakers assert that media and information literacy are crucial in understanding AI. They highlight the importance of education that familiarises individuals with media and information, narrowing the knowledge gap and enabling them to acquire the necessary competencies to comprehend AI. By enhancing their literacy in this area, people can make informed decisions and be better equipped to engage with AI technologies.

Another pertinent point emphasised by the speakers is the need for proper guardrails in AI education. While some guardrails are currently proposed by AI systems, there is an acknowledgment that they can be bypassed. Therefore, universities are encouraged to develop their own solutions to provide teachers and learners worldwide with the necessary guardrails. This will help establish a responsible and ethical framework for AI education.

Furthermore, the speakers stress the importance of source reliability and ethically sourced data in AI. They note that currently, there is a lack of ethically sourced data and a lack of consensus on the use of data scraping and models. This highlights the need for a careful and thoughtful approach to ensure that AI systems are built on reliable sources of data and adhere to ethical considerations.

Lastly, the speakers advocate for a focus on explainable AI. They argue that it is crucial to have access to the motivations behind the creation of AI systems and to validate their operations. By having transparency and explainability, AI technologies can be more trustworthy and accountable.

In conclusion, this discussion underscores the importance of taking a human-centred approach to AI development, fostering media and information literacy, implementing proper guardrails in AI education, ensuring source reliability and ethically sourced data, and prioritising explainable AI. By addressing these key points, individuals and society as a whole can navigate the realm of AI in an informed and responsible manner, maximising its potential benefits while mitigating potential risks.

Alejandro Pisanty

In an article discussing the role of universities in the era of Artificial Intelligence (AI), Alejandro Pisanty highlights the importance of approaching this technological advancement in a rational manner and resisting panic. He firmly believes that universities should serve as the depositaries of rational thought. Pisanty argues that in order for universities to adapt to the AI age, they need to ensure their relevance. He suggests that they play a major role in the mainstream of things and develop a solid academic system with reasonable infrastructure and faculties.

However, the article also raises concerns about brain drain in universities. Pisanty points out that higher-paying jobs in AI development at companies are attracting researchers away from academia. This brain drain is seen as a cause for concern, as it affects the quality of education and research at universities. Researchers also tend to move to places where they can actually conduct experiments and get their work published.

Regarding ethical considerations in AI, the Institute of Electrical and Electronic Engineers (IEEE) is developing a set of standards for ethical AI. However, translating these ethical codes or laws to AI developers is proving to be challenging. The difficulty lies in avoiding subjectivity and effectively implementing ethical standards in the development of AI systems.

Furthermore, Pisanty highlights the need to resist panic in the face of AI advancements. He suggests the development of tools to analyze conduct online, as problems in the digital realm often have a human and social element. Pisanty himself has developed a tool for analyzing online conduct, emphasizing the importance of addressing online misconduct proactively.

Universities also face the challenge of addressing the lack of pre-university ethical and mathematical education. It is seen as crucial for universities to cultivate ethical consciousness and mathematical competence among students, as a lack of these fundamental skills poses a significant challenge to education.

In conclusion, universities are encouraged to approach the AI era rationally and resist panic. The article emphasizes the need for universities to ensure their relevance in the AI age by playing a major role, developing a solid academic system, and addressing the challenges posed by brain drain. The development of ethical standards for AI and tools to analyze online conduct are also deemed essential. Additionally, universities must focus on cultivating ethical consciousness and mathematical competence in students to meet the demands of the AI age.

Eve Gaumond

The use of Artificial Intelligence (AI) in education has both positive and negative impacts. On one hand, AI has the potential to greatly improve the quality of education. It can provide students with personalised learning experiences, tailored to their individual needs and learning styles. This has the potential to enhance student engagement and motivation, leading to better learning outcomes. The ability of AI to analyse large amounts of data can also enable educators to identify areas where students may be struggling and provide timely interventions to support their learning.

However, on the other hand, there is a lack of data that supports the notion that personalised learning actually increases retention of information. While AI may be able to deliver content in a customised manner, it does not necessarily guarantee that students will retain the information more effectively. Some argue that the hype around educational technology (EdTech) can be akin to “modern snake oil” – promising transformative effects without concrete evidence to back it up. In fact, there are concerns about the negative impacts of EdTech, such as increased screen time, decreased social interaction, and the potential for data breaches that compromise student privacy.

Another important aspect to consider is the regulation of data collection and usage in education. The ‘datafication’ of students’ lives, starting from an early age and continuing throughout their academic journey, has raised concerns about the potential encroachment on students’ privacy and autonomy. The collection, storage, and analysis of vast amounts of data about students can have a discouraging effect on their engagement in meaningful formative experiences. It is crucial that policies and regulations are in place to prevent harm and protect students’ freedom in the context of data collection and usage in education.

In conclusion, while AI has the potential to revolutionise education by improving its quality and providing personalised learning experiences, there is a need for critical examination of its impacts. The positive effects of AI in education are not guaranteed and should be constantly scrutinised. Additionally, regulations must be in place to ensure the responsible and ethical collection and usage of student data. It is essential for stakeholders in higher education to understand AI sufficiently well to ask relevant questions and make informed decisions about its implementation.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Digital Me: Being youth, women, and/or gender-diverse online | IGF 2023 WS #255

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Vera Zakem

The analysis highlights the importance of multi-stakeholder collaboration in addressing tech-facilitated gender-based violence and gendered disinformation. The speakers stress the need for joint efforts and engagement from various stakeholders, including survivors, civil society activists, and members of the private sector. The Biden-Harris administration has announced the Global Partnership for Action on Gender-Based Online Harassment and Abuse, in association with 11 other nations.

The speakers also emphasize the significance of women, girls, LGBTQ+ communities, and youth in decision-making processes and civic engagement. They argue that investment in these groups is essential for bringing about meaningful change. USAID’s Transform initiative is mentioned as an example of efforts to promote the participation of these groups in civic life.

It is strongly emphasized that governments alone are insufficient in addressing these issues. Collaboration between governments, civil society, and private entities is necessary. The notion of multi-stakeholder solutions is advocated as the way forward, and it is suggested that such solutions should be developed at global, country, and sub-national levels. These solutions should involve governments, civil society actors, and private sector entities. The importance of multilateral cooperation and public-private partnerships is highlighted.

Overall, the analysis highlights the need for inclusiveness and collaboration to combat tech-facilitated gender-based violence and gendered disinformation. It calls for action that involves survivors, civil society, the private sector, and governments. By working together and investing in women, girls, LGBTQ+ communities, and youth, meaningful change can be achieved.

Daniela Cuspoca Orduz

Digital violence against women is a significant problem in Colombia, highlighting the urgent need for a specific regulatory framework to address it. Currently, there is a lack of legislation and guidelines that specifically target and prevent digital violence. This legal gap creates challenges in effectively dealing with these crimes and developing appropriate public policies.

One crucial issue highlighted by the analysis is that women who experience digital violence often face blame and re-victimization. Instead of receiving support and protection, they are often held responsible for the incidents or accused of provoking the violence. This victim-blaming mentality exacerbates the problem and adds to the challenges faced by the victims. Shifting this narrative is essential to ensure that women experiencing digital violence are provided with the necessary support and protection without being blamed or stigmatized.

Furthermore, there is a lack of interest and awareness in investigating digital violence cases. This lack of attention may be due to a limited understanding of the seriousness and impact of these crimes. Raising awareness among law enforcement agencies, policymakers, and the general public about the gravity of digital violence against women and its profound effects on victims is crucial. Increasing awareness can help direct more resources and attention towards investigating and addressing these crimes.

The analysis also emphasizes the need to recognize and prioritize digital violence as an issue requiring immediate attention in policy generation. The current legal gaps present challenges in creating effective public policies that specifically address digital violence against women. The nature of digital violence calls for tailored protective measures and responses that are distinct from those applied in offline contexts. Empowering women online is another crucial factor in combating digital violence and ensuring their safety and well-being in the digital space.

Advocates are urging the development of a dedicated framework against digital violence. Several initiatives related to framework development are currently pending approval in Congress. This demonstrates a growing recognition of the need to address digital violence comprehensively and proactively. Additionally, the Court has acknowledged the issue by recognizing instances of digital violence against women journalists.

In conclusion, digital violence against women is a serious issue in Colombia, necessitating the establishment of a specific regulatory framework and effective public policies. It is imperative to shift the blame from the victims to the perpetrators and increase awareness about the severity of digital violence. Tailored protective measures and responses are required to address the unique challenges posed by digital violence. Empowering women online is crucial in preventing and addressing digital violence. Ongoing initiatives in Congress and the recognition from the Court signal positive progress towards addressing this issue. However, further concerted efforts are needed to create a safer and more inclusive digital environment for women in Colombia.

Umut Pajaro Velasquez

The analysis highlights the challenges faced by women and gender-diverse individuals in the online world, focusing on issues of internet safety. It acknowledges that the internet is not always a secure and inclusive space for these groups, specifically addressing concerns such as cyberbullying, gender-based violence, and the digital divide. These challenges undermine the goals of gender equality and reduced inequalities, thus necessitating discussions and efforts to create a safe and inclusive digital environment.

The session aims to address the intersection of gender and youth online, with the ultimate objective of fostering a safer and more inclusive digital environment. By specifically considering this intersection, the session aims to tackle the unique challenges and concerns experienced by women and gender-diverse individuals in the online sphere. The ultimate goal is to establish an environment where gender equality is prioritised and where the rights and voices of these groups are not compromised.

To achieve this aim, the analysis proposes various strategies encompassing policy, education, and digital literacy. It emphasises the need for policy measures that protect the online rights of women and gender-diverse individuals, ensuring their safety, privacy, and digital well-being. Additionally, it suggests that educational initiatives and efforts to promote digital literacy should be intensified to empower individuals within these groups, enabling them to navigate the online world confidently and securely. By raising awareness and knowledge, it is believed that women and gender-diverse individuals will be better equipped to protect their rights and actively participate in discussions concerning internet governance.

Umut, a supporter of the cause, strongly advocates for a safe and inclusive digital environment for women and gender-diverse individuals. Through endorsing the objectives of the session, Umut actively contributes to the collective endeavor of creating a digital space that respects and acknowledges the rights of all individuals, regardless of their gender. Umut’s support signals a growing recognition of the importance of addressing these challenges and promoting inclusivity in the online world.

In conclusion, the analysis underscores the urgent need to address the challenges faced by women and gender-diverse individuals in the online world. By highlighting issues such as internet safety, cyberbullying, gender-based violence, and the digital divide, the session aims to establish a safe and inclusive digital environment. The proposed strategies, encompassing policy, education, and digital literacy, seek to uphold online rights and include diverse voices in discussions regarding internet governance. Umut’s support further reinforces the significance of these endeavors, underscoring the collective commitment to creating an inclusive digital space for all individuals.

Luisa Franco Machado

The analysis examines various aspects of the digital space and its impact on marginalized groups. One major issue discussed is shadow banning, portrayed as a form of online censorship that disproportionately affects discussions on women’s rights and systemic issues. Shadow banning is defined as a phenomenon that appears to be a technical glitch but is actually a manifestation of deeper systemic problems. The author’s personal experience is highlighted, where her political posts discussing these matters mysteriously vanished from her followers’ TikTok feeds. This serves as evidence of shadow banning’s negative impact on radical discussions.

The discussion then shifts to the oppressive nature of the digital space for youth, women, and gender diverse individuals. While the digital realm offers a platform for advocacy, it also becomes a breeding ground for backlash and harassment. Misogynistic and alt-right groups are specifically mentioned as organized contributors to the unease in the digital space. This evidence underscores the negative sentiment associated with the experiences of these marginalized groups.

Furthermore, the analysis explores the issue of personal data collection and its implications. It asserts that almost every institution collects personal data and digital footprints, which are subsequently used to reinforce oppressive structures and drive profits. This criticism raises concerns about the motivations behind data harvesting and how it often fails to contribute to public welfare or policy shaping.

Another point examined in the analysis is the erasure of marginalized groups resulting from restrictive binary thinking in digital spaces. An example is given of online forms typically offering only binary gender options, thereby neglecting non-binary and other identities. The erasure of diverse identities and the perpetuation of binary thinking is viewed as a negative aspect of the digital realm.

On a positive note, the analysis underscores the importance of celebrating diverse expressions and championing critical thinking in the digital space. These values are believed to contribute to a more inclusive and empowering environment. Additionally, it asserts that government intervention and accountable content moderation are necessary to address the issues discussed. Europe’s Digital Services Act (DSA) and Digital Markets Act (DMA) are cited as promising steps in the right direction.

Regarding representation, the analysis argues that feminist, queer, and diverse representation should be non-negotiable in both public institutions and major tech companies. This stance emphasizes the need for diversity in decision-making processes and the creation of inclusive digital spaces.

In conclusion, the analysis presents a comprehensive exploration of the impact of the digital space on marginalized groups. It highlights issues such as shadow banning, online oppression, data privacy concerns, erasure, and the need for diverse representation. The ultimate call is for the digital realm to celebrate diverse expressions, champion critical thinking, and for government and public intervention to ensure accountability and create a safer online environment.

Chilufya Theresa Mulenga,

The analysis highlights several key points made by the speakers. Firstly, it is noted that education and skill development have played a crucial role in fostering increased youth participation in Internet-related fields, particularly among young women. This is supported by the increase in online platforms that promote gender-related initiatives, as well as the implementation of STEM programs aimed at engaging young learners, including girls and gender diverse individuals. These efforts have led to a positive sentiment, as more and more youths are being empowered to pursue careers and opportunities in the digital sphere.

Moving on, the analysis underlines the impact of social media activism in raising awareness about inclusivity and social change. The speakers mention that online communities have provided a safe space for individuals from different backgrounds to connect and support each other. This sentiment is reinforced by the ability to share challenges and innovative solutions across different countries. By utilising social media platforms, activists have been able to amplify their messages and reach a wider audience, further strengthening their efforts towards reducing inequalities. Overall, the sentiment expressed towards social media activism is positive, as it has proven to be an effective tool for driving social change.

Furthermore, the analysis emphasises the significance of policy involvement in supporting youth-led organisations. In particular, it highlights a concrete example from Zambia, where members of parliament have actively invited young people to partake in discussions and initiate tailored development in local communities. Additionally, the creation of the CDF fund in Zambia has provided support for projects initiated by youth-led organisations. This positive sentiment towards policy involvement suggests that engaging young people in decision-making processes and providing them with resources can lead to sustainable development, as indicated by the alignment with SDG 11: Sustainable Cities and Communities and SDG 16: Peace, Justice, and Strong Institutions.

Lastly, the analysis points out the role of gender advocacy groups in promoting equality and safety for gender diverse individuals. Noteworthy evidence includes the presence of online petitions and campaigns led by young people, addressing issues related to gender, youth, and women. These efforts contribute to the pursuit of SDG 5: Gender Equality and generate a positive sentiment towards the advocacy for gender diversity.

In conclusion, the analysis highlights the positive impact of education, social media activism, policy involvement, and gender advocacy groups in empowering youth and promoting key social and gender-related goals. These findings underscore the importance of providing opportunities, resources, and support to young people, as they play a crucial role in shaping a more inclusive and equitable society.

Ayden Férdeline

The analysis provides a comprehensive overview of various arguments and perspectives on several topics. One argument focuses on the issue of inadequate representation of women, youth, and LGBT+ individuals in internet governance and coordination bodies. This is supported by researched participation data spanning the past 20 years. It is argued that these marginalised groups are not given enough influence in decision-making processes, resulting in a lack of diverse perspectives and potential biases in internet governance.

Another critique discussed in the analysis pertains to civil society’s approach to making change. It is pointed out that there is a lack of a clear theory of change, which may hinder effective strategies for addressing key societal issues. Furthermore, civil society seems to struggle with managing trade-offs that may arise in the pursuit of their goals. The sentiment towards this critique is negative, indicating dissatisfaction with the current approaches employed by civil society to bring about meaningful change.

On a more positive note, the analysis highlights the need for advocacy from a position of power instead of victimhood to achieve sustainable results. It is argued that advocacy efforts should not solely rely on portraying oneself as a victim, but rather focus on empowerment and leveraging existing positions of influence to drive real change. This argument is supported by the observation that exclusion is often intentional and that setting goals, prioritising, and fighting one battle at a time would yield more effective advocacy outcomes.

The analysis also includes a stance that supports focus and goal-setting in advocacy, despite the inherent difficulty in doing so due to the presence of multiple pressing issues. It is acknowledged that advocacy efforts tend to be scattered amidst numerous important causes, making it challenging to channel resources and efforts towards achieving specific goals. Nonetheless, the importance of setting clear objectives and concentrating efforts is emphasised, as it enables more targeted and impactful advocacy work.

In conclusion, the analysis presents a range of viewpoints on different topics. It highlights the need for greater representation of marginalised groups in internet governance, the necessity for a well-defined theory of change in civil society’s approach, the importance of advocacy from a position of power, and the benefits of focus and goal-setting in advocacy work. By considering and addressing these perspectives, it becomes possible to enhance the effectiveness and inclusivity of various societal initiatives.

Hollie Hamblett

The analysis reveals that women face significant inequalities as consumers, despite representing 51% of the global population and making the majority of global purchasing decisions. Shockingly, their needs are often disregarded in policy, product design, and service provision. This inequality is evident in the form of the “pink tax”, financial barriers, and sexism in advertising.

The “pink tax” refers to the practice of charging higher prices for products and services marketed to women compared to similar products marketed to men. This discriminatory pricing perpetuates gender-based inequalities by forcing women to pay more for essential items such as personal care products and clothing. Additionally, financial barriers prevent women from accessing financial services and resources, limiting their economic empowerment. Sexism in advertising further exacerbates inequalities, as it perpetuates harmful gender stereotypes and objectifies women, often influencing their choices as consumers.

One of the key arguments put forward is that consumer protection frameworks lack gender equality. Despite the significant purchasing power and influence that women have, these frameworks fail to adequately address their specific needs and concerns. The analysis highlights the urgent need for consumer protection policies and regulations to incorporate a gender lens, ensuring that women’s rights and interests are protected and promoted.

To address this issue, it is suggested that gender-disaggregated data be collected and used in policy, product design, and service provision. Such data can reveal the truth about women’s experiences in the marketplace, aiding in the identification and elimination of sexist biases. Without reliable data, gender biases may persist, and misguided policies may unintentionally cause harm to women. Therefore, prioritising the collection and analysis of gender-disaggregated data is essential for promoting gender equality in consumer protection.

Furthermore, the analysis emphasises the importance of a multi-stakeholder approach. It is suggested that designers, developers, researchers, and marketing authorities work together to create gender-equal products and policies in digital spaces. This collaborative effort can help address biases and discriminatory practices present in the design and development of digital products. Additionally, raising public awareness about consumer rights can empower women to assert their economic interests and demand gender-equal treatment in the marketplace.

In conclusion, women continue to face inequalities as consumers, with their needs often overlooked in policy, product design, and service provision. The “pink tax”, financial barriers, and sexism in advertising are examples of the challenges they encounter. The analysis underscores the need for consumer protection frameworks to embrace gender equality, highlighting the importance of gender-disaggregated data and a multi-stakeholder approach. By prioritising women’s experiences and empowering them in their consumer choices, a more gender-equal marketplace can be achieved.

Agita Pasaribu

Since the start of the COVID-19 lockdown in 2020, Indonesia has witnessed a staggering 300% surge in online abuse cases. One prevalent concern is non-consensual intimate image abuse, which predominantly affects young females. This increase in online abuse has become a significant issue in the country during the pandemic.

Despite the passing of a law on sexual violence crimes, prosecuting online abuse perpetrators across different jurisdictions remains a considerable challenge. Cross-border jurisdiction issues complicate and hamper the process of holding these perpetrators accountable for their actions.

To effectively tackle online harassment, it is crucial to strengthen global partnerships and involve all stakeholders in policy development. By engaging tech companies, particularly online platforms, in policy-making processes, it becomes possible to comprehensively address and prevent online harassment. Incorporating both global and local perspectives is essential to ensuring that policies are effective and inclusive.

Ethical AI practices can play a vital role in protecting individuals online. Deepfake pornography using AI has become a pressing issue, violating the rights and mental well-being of women and gender diverse individuals. Policies should actively protect digital citizens and ensure that technology serves as a force for progress rather than harm.

Preventing online harassment requires the collective efforts of various stakeholders. Governments, tech companies, schools, parents, and civil society all have unique roles to play. Stakeholders need to advocate for safety measures, embed digital literacy in education systems, support victims of online harassment, and promote ethical digital citizenship.

In conclusion, the COVID-19 pandemic has led to a significant increase in online abuse cases, with non-consensual intimate image abuse being a prevalent concern in Indonesia. The prosecution of online abuse perpetrators is hindered by cross-border jurisdiction issues. Strengthening global partnerships, involving tech companies in policy development, advocating for ethical AI practices, and engaging all stakeholders are essential in effectively combating online harassment.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Empowering Civil Servants for Digital Transformation | IGF 2023 Open Forum #60

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Audience

The lack of digital skills and AI competencies in the public sector has significant implications for the adoption of AI. This is because the absence of necessary technical competencies can result in inhibitory legal measures. Without the required digital skills and AI competencies, it becomes difficult for the public sector to fully embrace and implement AI technologies, leading to prohibitory laws that hinder its adoption.

Similarly, the lack of technical skills within government teams poses challenges to the sustainability of AI projects and their transfer from the private to the public sector. The co-development and handover phases of project life cycles become difficult due to a lack of understanding and technical abilities. The absence of these skills hinders the successful implementation and continuation of AI initiatives in the public sector.

Public-private partnerships are seen as key for successful digital transformation, but achieving these partnerships has proven to be challenging. Donors insist on public-private partnerships to drive digital transformation, but the realization of these partnerships has been difficult. Despite the positive sentiment towards public-private partnerships, their implementation poses obstacles that need to be overcome.

Civil servants should be better equipped with digital skills to drive transformation in the public sector. Different skill levels are needed for different civil servant levels, as higher-level civil servants may require a different set of skills than the average government worker. Embedding digitally competent officers can help bring about digital transformation, which is viewed positively.

Before any government department embarks on digital transformation, a deep dive study on the impacts is necessary. Such a study, involving all stakeholders, can result in a nuanced understanding of the transformation process. It is important to ensure that the intentions are aligned with the execution to avoid falling short. The positive sentiment towards deep dive studies highlights the need for a thorough understanding of the impacts of digital transformation.

Synergy and buy-in from multiple levels of government are essential for successful digital transformation. In countries like India, where both the central and state governments implement digital transformations, synergy becomes crucial. Additionally, many civil servants may have pushback towards new technologies and processes. To drive successful digital transformation, it is important to demystify these technologies and processes for them. This is viewed positively as it emphasizes the importance of collaboration and cooperation in digital transformation.

A rights-based approach and end-to-end native language digital transformation are important considerations in the implementation of digital transformation. Often, rights are overlooked during the transformation process, and it is necessary to ensure that a rights-based approach is adopted to protect individuals. Furthermore, digital transformation should be end-to-end in native languages, including voice-based technology, to ensure inclusivity and reduce inequalities.

There is a significant lack of awareness and involvement in digital public infrastructure (DPI) issues in African countries. A survey conducted across 24 African countries involving the CSO community and members of parliament revealed a low level of involvement and understanding of DPI issues. This neutral sentiment highlights the need for increased awareness and engagement in DPI matters in African countries.

Addressing simultaneous issues in the public sector, such as data protection, blockchain, and digital ID, requires a multidimensional approach. It is necessary to curate solutions with a broad understanding of these issues. This sentiment suggests that a holistic approach is needed to tackle the multifaceted challenges in the public sector.

Tailor-made strategies for different audience types within the public sector are important. This includes tech experts, literate consumers, and decision-makers, who may require different types of capacity building. In addition, a gender-sensitive approach is necessary to ensure that digital capacity building is inclusive and addresses the specific needs of women. This positive sentiment emphasizes the importance of tailored strategies and gender equality in the public sector.

Cultural change, continuous assessment, and the development of collaboration skills are necessary alongside digital skills. Government resistance to change due to age-old systems can hinder digital transformation. Institutions like UNESCO can provide frameworks for reliable data and support in fostering digital skills, which is viewed positively.

It is important to address the fear and misunderstanding around AI in the civil service sector. The fear of AI in civil service can stem from misunderstandings, and there is a need for more clarity regarding the role and capacity of AI. This negative sentiment highlights the importance of addressing concerns and providing clear explanations about AI in the civil service sector.

Gaps exist in knowledge about the relationship between technologies and their human rights impact. It is important to consider human rights impacts in digital capacity building. This is viewed positively as it underscores the need for responsible and ethical approaches to technology implementation.

Digitalization should be seen as a tool to solve specific problems rather than just an end goal. The application of technology without understanding the problem it aims to solve can be disruptive and limit problem-solving capacity. This negative sentiment highlights the need for a problem-driven approach to digital transformation.

Technologies impact people and communities at risk differently, and such communities should be involved from the start. These communities have often been least effectively served by government agencies. This negative sentiment emphasizes the importance of inclusivity and involvement of marginalized communities in digital transformation.

Digitalization can also be useful for improving internal processes within organizations. The use of artificial intelligence, for example, can improve tasks such as searching legal text. This positive sentiment highlights the potential benefits of digitalization for organizational efficiency and effectiveness.

Receptiveness to feedback from civil society is vital for the successful implementation of digital transformation in the public sector. Involving public opinion and enhancing public engagement are essential for driving digitalization. Education reform and stronger cyberinfrastructure investments are also necessary. This positive sentiment underscores the importance of stakeholder engagement and collaboration in digital transformation.

Capacity building in the judiciary is required to handle issues related to administration and policymaking in digital transformation. This neutral sentiment highlights the need for specialized skills and knowledge within the judiciary to address legal aspects of digital transformation.

Complexity and uncertainty in digitalization can lead to fear and resistance. The fast-paced learning and constantly evolving nature of technology introduce challenges and uncertainties, which can discourage individuals from embracing digitalization. This negative sentiment points out the need for support and guidance in navigating the complexities of digital transformation.

Building capacities towards digitalization should be a collective effort rather than an individual one. The challenge posed by the literacy problem in societies highlights the need for community-wide initiatives to enhance digital skills. This neutral sentiment highlights the importance of collaboration and collective action in driving digital transformation.

AI can provide new approaches to learning and demystify digitalization. AI-based tools, such as simulation and studying behaviors in collective learning, have the potential to revolutionize education and facilitate understanding of digitalization. This positive sentiment recognizes the transformative potential of AI in the learning process.

Regulation needs to catch up with the fast-paced development of technology. The pace of technological advancement often surpasses the ability of regulations to keep up. Changes in regulations from GDPR to AI acts highlight the need for regulatory updates to effectively govern new technologies. This negative sentiment calls for increased regulatory agility.

Lifelong learning and adaptation are necessary in the digital age. The constant evolution of technology, such as the development of ChatGPT, and changing regulations require individuals to continuously update their skills and knowledge. This positive sentiment emphasizes the importance of continuous learning in the digital era.

In conclusion, the lack of digital skills and AI competencies in the public sector poses challenges to the adoption and successful implementation of AI technologies. Public-private partnerships, tailored strategies, and a human-centric approach are important for driving digital transformation. Deep dive studies, synergies, and a rights-based approach are necessary for effective digitalization. Addressing fears and misunderstandings, considering human rights impacts, and involving marginalized communities are crucial elements of digital capacity building. Receptiveness to feedback, capacity building in the judiciary, and regulating technology at an appropriate pace are vital for digital transformation. Overall, the multifaceted nature of digital transformation requires a comprehensive and collaborative approach to ensure its success in the public sector.

Nobu Nishigata

During the discussion, the speakers explored various challenges and opportunities related to technology in government services. One major issue that was highlighted was the difficulties in connectivity specifically with Zoom, compared to other platforms such as Webex and Teams. It was mentioned that there is a preference for Zoom over Webex and Teams for webinars specifically, however, there are still challenges in achieving seamless connectivity.

Another important aspect discussed was the need for better tech understanding among government workers. It was noted that there are differences in tech capabilities and requirements across various government sectors. In particular, there is a lack of understanding among “normal” people in the government who work on document creation. An expectation was expressed for AI technology to aid in their work, providing a solution to these challenges.

The risks associated with AI technology were also a concern. It was highlighted that allowing every government person to use Chat GPT, an AI technology, within the government network comes with certain risks. The speakers emphasized the need for more understanding and awareness of AI technology to mitigate these risks effectively.

The advantages and challenges related to cloud services were also discussed. The government has a preference for on-premises services due to security concerns. However, it was acknowledged that cloud services offer advantages in terms of cost and efficiency. The discussion touched upon the need for a better understanding of the benefits of cloud services and finding a balance between security and efficiency.

One significant conclusion drawn from the discussion was the expectation for UNESCO and its partners to aid in improving government services through a better understanding of new technology. The goal is to leverage this understanding to enhance the delivery of government services. This expectation reflects a positive sentiment towards the potential impact of collaboration between UNESCO and government agencies.

In summary, the discussion highlighted the challenges of connectivity with Zoom, the need for better tech understanding among government workers, the risks associated with AI technology, the advantages and challenges of cloud services, and the expectation for UNESCO and its partners to aid in enhancing government services through improved technology understanding. These insights provide valuable observations for addressing the technological needs of government services.

video

Artificial intelligence (AI) and digital transformation are predicted to contribute over $13 trillion to the global economy by 2030. These technologies are shaping societies and economies in a positive way. The adoption of AI and digital transformation has the potential to stimulate economic growth and improve productivity across various industries.

Policymaking plays a crucial role in ensuring sustainable development amid the impact of AI and digital transformation. It is important for policymakers to consider the needs of different social groups and the environmental implications of these technologies. By implementing appropriate policies, governments can leverage AI and digital transformation to achieve sustainable development goals.

However, there is a significant issue of readiness among civil servants for the digital revolution. Many countries lack strategies to improve digital skills, and siloed decision-making prevents the effective implementation of digital transformation schemes. This lack of preparedness hinders the full potential of AI and digital technologies in the public sector.

To overcome these challenges, it is important to ensure that the adoption of digital technology and systems is inclusive and tailored to the unique context of each organization. Competency gaps in digital adoption, data analysis, IT, and AI skills need to be addressed, with particular attention given to the inclusion of women. Low levels of investment in digital adaptation create disparities and hinder progress towards reducing inequalities.

Upgrading government organizations for the digital age is crucial. Cultural and organizational barriers, along with data and infrastructure issues, pose challenges to digital transformation in the public sector. However, by addressing these barriers and investing in the necessary resources, governments can enhance their ability to deliver services efficiently and effectively.

The introduction of the Artificial Intelligence and Digital Transformation Competency Framework is a positive step towards equipping public sector officials with the necessary skills and knowledge. This framework, based on extensive research, outlines the essential digital competencies required in the digital age.

In addition to the competency framework, the Digital Planning and Design, Data Use and Governance, and Digital Management and Execution domains are established to improve understanding and address complex problems associated with digital transformation.

To achieve successful digital transformation, a particular mindset is necessary. Trust, creativity, flexibility, curiosity, and experimentation are essential for embracing and adapting to the changes brought about by AI and digital transformation.

In conclusion, AI and digital transformation have the potential to significantly impact economies and societies. Policymaking, inclusivity, and the competency development of civil servants play important roles in ensuring sustainable development. Although challenges exist, upgrading government organizations and embracing the right mindset will enable successful digital transformation, with the potential to drive economic growth and improve overall societal well-being.

Gianluca Misuraca

There is a growing recognition for the need for a global digital governance framework. This call has been made by influential figures such as Kofi Annan in 2002, who highlighted the urgent need for Information and Communication Technologies (ICTs) to bridge the digital divide. This need for a framework continues to be pushed by current UN Secretary-General Antonio Guterres, who advocates for a human-centric digital transformation strategy.

The importance of AI governance in the public sector is a central focus. The use and management of Artificial Intelligence (AI) in this sector are deemed crucial and require the incorporation of human-centric principles. The AI4Gov program has been launched to equip civil servants with the necessary skills to handle AI implementation and governance. This program aims to enhance the understanding of AI technology, its ethical use, procurement systems, and the need for interdisciplinary skills. The program also emphasizes the importance of teamwork in dealing with complex issues.

Addressing the multidimensional and complex issues linked to digital transformation is of utmost importance. It has been reported that only 20% of UK civil servants are currently equipped with the skills needed to manage the digital future. This indicates an urgency to upskill civil servants to handle the challenges and opportunities brought by digital transformation. The development of a comprehensive national framework is crucial in ensuring that countries are digitally ready and capable of effectively managing the digital landscape.

UNESCO has been actively working towards operationalising the guidelines and principles they have provided. Efforts include the development of a self-assessment methodology for policymakers and civil servants to improve their capacity. Additionally, principles have been designed for an open educational resources repository, and a proposal for a short-term curriculum for the training of policymakers has been put forward.

The creation of a digital competence framework, addressing areas such as digital planning and design, data generation and user governance, and management and implementation, is underway. This framework aims to provide a toolkit for inclusive digital planning and design. Furthermore, the idea of establishing a knowledge-sharing community in the realm of digital governance and AI competence is being explored.

Overall, the need for a global digital governance framework remains evident. The use and governance of AI in the public sector are central in this regard. Efforts to equip civil servants with the necessary skills, operationalise guidelines, and develop inclusive digital planning and design tools are crucial steps towards effective digital governance. There is a clear emphasis on the importance of interdisciplinary skills, teamwork, and a human-centric approach in addressing the challenges and opportunities presented by digital transformation.

Prateek Sibal

A joint convening by UNESCO and GIZ’s Fair Forward team highlighted the importance of capacity building for civil servants in the context of digital transformation. The meeting aimed to encourage communication and learning between ongoing capacity building initiatives. Collaboration and knowledge sharing were identified as crucial for effectively preparing civil servants for the digital age.

The formation of a coalition model for sharing good practices and developing new content was supported. This coalition has the potential to create new knowledge products that can benefit organizations globally, contributing to digital transformation efforts. The need for practical implementation of competency frameworks, such as the one focused on AI and digital transformation, was emphasized.

The impact of AI and digital transformation on societies and economies was acknowledged, with a projected contribution of over $13 trillion to the global economy by 2030. However, a recent survey revealed that most civil servants are not adequately equipped for digital transformation. This is attributed to the lack of strategies to improve digital skills and barriers caused by siloed decision-making processes.

UNESCO proposed solutions to overcome capacity barriers related to culture, organization, data, infrastructure, and human resources. A comprehensive approach that addresses multiple dimensions of digital capacity building is needed. Public sector officials were also identified as requiring a solid understanding of digital technologies for effective transformation.

Trust, creativity, flexibility, curiosity, and experimentation were highlighted as crucial qualities for successful digital transformation. These qualities enable individuals and organizations to embrace new technologies and navigate the ever-evolving digital landscape.

Prateek Sibal advocated for capacity building in government organizations, emphasizing the use of digital solutions, new technologies, tools, and strategies to solve complex problems. This highlights the role of digital capacity building in enabling governments to address the challenges of the digital age.

The complexity of digital capacity building was recognized, emphasizing the need for continuous learning and literacy about evolving technology. Digitalization necessitates rapid learning and adaptation to technological advances. Lifelong learning was identified as crucial due to the pace at which technology and related regulation evolve.

A dynamic coalition on digital capacity building involving civil society, academia, governments, and the private sector was proposed. This coalition would serve as a community of practice for knowledge sharing and collaboration. It would also focus on developing assessment methodologies for civil servants, enhancing their preparedness for digital transformation.

The gap between technology and regulation was highlighted as a concern. With technology advancing at a faster pace than the creation of related regulation, individuals may feel uncertain and fearful about rapidly developing digital technologies. Proactive regulation that keeps up with technological advancements is crucial.

In conclusion, the joint convening by UNESCO and GIZ’s Fair Forward team emphasized the critical role of capacity building for civil servants in the context of digital transformation. Collaboration, knowledge sharing, and practical implementation of competency frameworks were highlighted. Additionally, the impact of AI and digital transformation, challenges faced by civil servants, and proposed solutions were discussed. A comprehensive, multidimensional, and global strategy for digital capacity building is essential.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

DigiSov: Regulation, Protectionism, and Fragmentation | IGF 2023 WS #345

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Audience

The analysis features three speakers who delve into different aspects related to the internet and its impact on global trade and regulation. The first speaker emphasizes the complexities of the internet and how it has transformed the world. They also discuss the influence of state trade policies on end users. It is noted that critical resources play a significant role in this realm. Additionally, the speaker highlights that not all critical resources are managed by states, providing the example of IP and IPv4 blocks. Overall, their stance is neutral.

The second speaker raises a question posed by Samridhi Kumar regarding a potential different approach to the idea of fragmentation in the Global North and South from a regulatory perspective. The speaker focuses on topics such as fragmentation, the Global North and South, and internet regulation. This discussion is closely linked to SDG 9 (Industry, Innovation, and Infrastructure) and SDG 16 (Peace, Justice and Strong Institutions). Unfortunately, no supporting facts or evidence are provided, leaving their stance neutral.

The third speaker, responding to an inquiry by Amir Mukavi, explores the effects of internet weaponization, digital interference, and violence in campaigns from abroad. They also discuss the impact of these factors on internet fragmentation. The speaker suggests ways to avoid this situation, particularly by promoting cooperation between cross-border digital entities and national competent authorities. Their sentiment is concerned.

From the analysis, it becomes evident that the internet is a complex domain that has greatly transformed the world. State trade policies have profound effects on end users, while critical resources have a crucial role to play. Additionally, questions arise regarding the regulatory perspectives on fragmentation in different regions of the world, highlighting potential disparities. The analysis also brings attention to the detrimental impact of internet weaponization, digital interference, and violence in campaigns from abroad, as they contribute to internet fragmentation. Cooperation between cross-border digital entities and national competent authorities is suggested as a preventative measure. Overall, the analysis provides insights into the multifaceted nature of the internet and its implications for global trade and regulation.

Neelesh Maheshwari

The analysis explores various aspects of digital sovereignty and internet regulations, discussing the importance of policies and regulations aimed at exerting state control over internet public policy issues within territories. Digital sovereignty has gained significant attention in recent years, with regulations having extraterritorial implications due to the nature of the internet.

The analysis argues for the need to address monopolistic tendencies of big corporations and promote the growth of small businesses, asserting that states have the right to combat these tendencies while ensuring a level playing field. The focus is on supporting small businesses and reducing inequalities in the digital economy.

Regarding data localization, the analysis suggests keeping restrictions minimal and opposes unnecessary constraints on the free flow of data based on security or information localization requirements. The example of the Indian government’s Digital Personal Data Protection Act is cited as a liberalized data protection regime.

The analysis emphasizes the inclusion of Global South countries in digital trade agreements and negotiations, recognizing their lack of infrastructure and institutional capacity. Capacity-building initiatives are seen as vital for these countries to benefit from big data, AI, and machine learning.

Regulations to combat the dissemination of disinformation and misinformation on the internet are deemed necessary, highlighting the real-life harm caused, particularly in the Global South. The analysis asserts the need for effective regulations in addressing this issue.

Concerns are raised regarding the potential limitation of fundamental rights due to regulations, cautioning against restrictions on freedom of speech and other fundamental rights when implementing regulations.

The analysis advocates for international norms and dialogue to address internet-related issues, promoting a standardized approach and providing guidelines for corporations facing state demands.

The potential risks of leaving public policy functions to private corporations are highlighted, citing surveillance capitalism and instances such as Cambridge Analytica, Snowden revelations, and electoral interferences. Regulatory oversight of public policy functions is advocated to prevent the misuse of power by private entities.

Different perspectives on the weaponization of the internet in the Global North and Global South are discussed, with cybersecurity and attacks on critical infrastructure being a focus in the North, while information security is a concern in the South.

Governance challenges in the digital age are addressed, emphasizing the need for novel approaches to address these challenges effectively.

The analysis stresses the importance of regulations that consider different contexts, allowing countries to pursue their own policies while ensuring a holistic approach to internet governance.

In conclusion, the analysis emphasizes the significance of digital sovereignty and regulations to exert state control over internet public policy issues. It advocates for the promotion of small businesses, reduced inequalities, and minimal restrictions on data flow. It highlights the necessity of regulations to combat disinformation, the importance of international norms and dialogue, and the potential risks of leaving public policy functions in the hands of private corporations. The differing perspectives between the Global North and Global South, as well as new governance challenges, are also considered. The analysis calls for regulations that consider different contexts and allow countries to pursue their own policies while maintaining a comprehensive approach to internet governance.

Andrea Beccalli

The analysis provides a comprehensive overview of the current state of the internet and its governance, shedding light on several important points. One key highlight revolves around the principle of global accessibility of the internet, which is seen as essential and fundamental. It is emphasized that the internet functions as a network of networks, with approximately 60,000 networks operating as one single internet. Any disruption to the principle of global accessibility could result in the fragmentation of the internet, which would have significant implications for connectivity and communication worldwide.

Another point of concern raised in the analysis is the potential risk associated with policy development on the application layer of the internet. Discussions surrounding the application layer are gaining more attention, but it is crucial to consider the sovereignty of countries and ensure that public authorities handle any issues related to it. Disruptions in the application layer have the potential to disrupt the underlying technical layer, amplifying the need for careful consideration and policy-making in this area.

The geopolitical and economic context also plays a pivotal role in shaping the internet and its governance. The analysis notes that during the creation of the Internet Corporation for Assigned Names and Numbers (ICANN), globalization was on the rise. However, current global events and wars have dramatically changed the way we view and use the internet, which necessitates a reevaluation of its governing principles.

Furthermore, the analysis emphasizes the need for the evolution of the internet governance model. The current model, established around 30 years ago, was designed when the internet was nothing like what it is today. With the growing complexity and usage of the internet, the model needs to adapt and evolve to effectively address the challenges posed by the modern digital landscape.

The impact of internet fragmentation is also explored in the analysis. It is highlighted that the size and development of a market can have varying implications when it comes to fragmentation. Fragmenting a market as large as the European Union, for example, can have a different impact compared to a smaller market in the global south. Fragmentation could potentially exacerbate the digital divide, particularly in underdeveloped regions and countries.

Additionally, the analysis delves into the potential consequences of regulations and policies on the internet. The influence of regions such as Europe, China, and India in shaping internet regulations is noted, with concerns raised about certain regulations being inconsiderate of the impacts on the global south. It is crucial for policymakers to be mindful of the potential ramifications of their actions and to consider the specificities of the internet landscape.

The analysis also highlights the importance of not taking internet access for granted. The internet serves as a tool for global connection, transcending platforms, languages, and time zones. However, it should be acknowledged that internet access often comes at a cost to users or through public means, and its value should not be underestimated or overlooked.

Lastly, policymakers are urged to be specific and mindful of the consequences of their actions in the realm of internet regulation. The internet has been weaponized and misused for purposes it was not initially designed for, which underscores the need for careful and well-informed policymaking in order to address issues such as free speech and cybercrime effectively.

In conclusion, the analysis provides a comprehensive overview of several crucial aspects of the internet and its governance. It emphasizes the importance of upholding the principle of global accessibility, while also addressing the risks and challenges posed by policy development, geopolitical and economic factors, internet fragmentation, and the need for an evolved governance model. Policymakers are urged to be mindful and specific in their actions, and internet access should be valued as a tool for global connection.

Bruna Santos

There has been a significant discussion about internet fragmentation, which has resulted in the creation of a policy network. This network aims to promote inclusive discussions and resource sharing on the topic. It focuses on addressing the challenges posed by fragmentation in different aspects of the internet, including user experience, internet governance and coordination, and the technical layer of the internet.

One of the key concerns raised in these discussions is the lack of inclusivity and coordination in internet governance. This could lead to decision-making without consensus, favoring multilateralism over multi-stakeholder participation. It is argued that an inclusive approach is crucial to ensure that all relevant stakeholders have a say in shaping the future of the internet.

Fragmentation can be caused by various factors, such as client-side instruments or legislative interferences, which can lead to negative outcomes like internet shutdowns or restrictions on access to certain content or apps. Striking a balance between security measures and preserving open access to information is essential.

Advocates for user experience on the internet argue that it should adhere to principles of equality, enhancement, choice, impact assessment, harmonization, and allowing users to shape their own experience. Empowering users and providing them with diverse options to customize their internet experience is considered crucial.

The discussions on internet regulation have gained traction in many countries and member states, with ongoing debates on topics like disinformation regulation. The potential impact of internet regulation on the way the internet is viewed and used is being closely examined.

While regulation may be necessary in certain areas, it is important for policymakers to consider the significant aspects of the internet before implementing wide-ranging regulations. Striking a balance between addressing concerns and preserving the open and innovative nature of the internet is crucial.

The need for inclusive and balanced international regulations for information security is emphasized. It is argued that these regulations should take into account the perspectives of victims and marginalized communities, who are often excluded from the conversation. By including their voices, power imbalances can be addressed, ensuring equal representation in discussions on information security.

In summary, the discussions on internet fragmentation have led to the establishment of a policy network to facilitate inclusive conversations and resource sharing. This network focuses on addressing fragmentation in various aspects of the internet. The importance of inclusivity, user empowerment, and balanced international regulations is highlighted to mitigate the challenges posed by internet fragmentation. Policymakers are urged to approach regulation carefully, considering the significant aspects of the internet and maintaining its open and innovative nature.

Venceslas Katimba

The Democratic Republic of Congo (DRC) has made significant progress in digital transformation and internet inclusion. In 2021, the country appointed its first minister in charge of digitalization, demonstrating its commitment to embracing new technologies. The DRC has also adopted a digital law to regulate the digital sector, ensuring structured and controlled digital activities. Additionally, the country has signed the Malabo Convention for cybersecurity and data protection, emphasising its dedication to safeguarding data privacy.

However, the DRC still faces challenges in connectivity and internet access. Over 50% of the population lacks coverage, highlighting a digital divide. Private operators like Facebook and Google are investing in infrastructure, including the construction of a second cable, to improve connectivity. The DRC aims to connect to five submarine cables, bridging the digital divide and enhancing access to internet resources.

In conclusion, the DRC’s digital transformation efforts are underway with the appointment of a digitalization minister and the adoption of a digital law. The country’s commitment to cybersecurity and data protection through the Malabo Convention is also commendable. However, improving connectivity and internet access remains a challenge. Nonetheless, investments in infrastructure by private operators and plans to connect to submarine cables show a determination to address this issue and promote internet inclusion in the DRC.

Turra Daniele

The analysis thoroughly examines the complex issues of internet fragmentation and governance. There is an increasing debate about the sovereignty of countries in relation to the application layer of the internet. This indicates a growing concern among nations about maintaining control over their respective internet spheres.

Furthermore, the analysis highlights the impact of trade policies on the end users of the internet and the management of critical internet resources. It is evident that trade policies can have far-reaching consequences for the accessibility and affordability of the internet for individuals and businesses. Additionally, the analysis notes that the management of critical internet resources, such as IPv4 blocks, is not solely dependent on state involvement. This suggests the need for a comprehensive multi-stakeholder approach in addressing these issues.

A key argument put forth in the analysis is that protectionist policies made by states should consider a multi-stakeholder model. It stresses that critical resources are not solely managed by states, and emphasizes the importance of incorporating various stakeholders in policy-making processes.

The analysis also explores the potential consequences of internet regulations. It highlights the possibility of these regulations leading to changes in the current internet landscape. Moreover, the analysis notes that different countries and member states are actively enacting various aspects of internet regulation. This raises important concerns about the management of the multi-stakeholder model when it comes to specific risks of fragmentation, indicating the challenges associated with balancing regulation and maintaining an open internet.

Another aspect addressed in the analysis is the challenge of determining who should review specific policy requirements. It notes that it can be difficult to establish a central authority or body responsible for reviewing and shaping policy requirements. This highlights the complexity involved in ensuring effective policy management in relation to internet fragmentation and governance.

The analysis stresses the need to include all perspectives in the design of global policies. It highlights the Internet Governance Forum (IGF) as a valuable space for inclusive discussions and contributions from a diverse range of panelists from various countries. The analysis recognizes that issues of internet governance affect not only local communities but also have global implications. Consequently, including multiple perspectives helps mitigate biases and ensures comprehensive policies that cater to the needs and interests of all stakeholders.

Lastly, the analysis points out concerns about connectivity issues and their impact on internet policies and governance. The importance of connectivity is emphasized, with one of the panelists, Venceslas, experiencing connectivity issues during the discussion. This serves as a reminder that connectivity is central to effective internet policies and governance, and efforts must be made to address connectivity challenges to achieve a truly inclusive and accessible internet for all.

In conclusion, the analysis provides a detailed examination of the complex issues surrounding internet fragmentation and governance. It sheds light on the debates over national sovereignty, the impact of trade policies on end users, the management of critical internet resources, and the challenges associated with regulatory measures. The analysis advocates for a multi-stakeholder model in policy-making, emphasizes the need for inclusive global policies, and highlights the importance of addressing connectivity issues. Overall, it provides comprehensive insights into the multifaceted nature of internet fragmentation and governance.

Speakers

&

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Andrea

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Bruna

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Development of Cyber capacities in emerging economies | IGF 2023 Open Forum #6

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report


Audience

During the discussion, several crucial topics were brought up, including digital diplomacy, cyber diplomacy, cyber capacity building, digital education, administrative risk, cyber security, DNS, OTT, CEO awareness, investment in cybersecurity tools in developing countries, AI in cyber intelligence, cyber certification, and cybersecurity education.

One of the main points emphasized was the need to differentiate between digital diplomacy and cyber diplomacy. A curious audience member posed the question to the speaker, highlighting the audience’s interest in understanding the distinction between these two terms.

Another key point was the importance of cyber capacity building in achieving broader development goals. It was argued that cyberspace is an integral part of a country’s development, and investment in securing cyberspace significantly affects the success rate of other policy initiatives. Academia and policymakers have stressed the need to integrate cyber capacity building and development policies.

The significant contribution of digital education in dealing with cyberspace issues and developing cybernetics was also highlighted. Digital education involves utilizing the internet critically and reflectively, and it was argued that long-term digital education can prepare a society for life in a cybernetic context.

The critical role of cyber security in economic development was another focal point of the discussion. Evidence from a research program sponsored by UNECA demonstrated that an increase in cyber security maturity could lead to a substantial increase in GDP per capita. The research incorporated data from Africa, Asia, and Latin America, providing a broader perspective on the impact of cyber security on economic growth.

The need for leadership and policymakers to recognize the connection between cyber security and economic development was emphasized. The results of the research program sponsored by UNECA were seen as a persuasive tool for promoting this understanding among decision-makers.

Concerns regarding the affordability and sustainability of investing in cybersecurity tools in developing countries were also raised. A concerned individual highlighted the challenges of providing affordable and sustainable cybersecurity solutions in countries with limited resources.

The discussion also touched on the challenges of balancing the use of AI in cyber intelligence and preventing its malicious misuse. It was noted that AI can be a powerful tool for cyber intelligence, but precautions must be taken to avoid its misuse for malicious purposes.

The deficit of cyber security experts and the expensive nature of cyber certification were also mentioned. It was argued that cyber certification is an expensive process, and there is a scarcity of skilled cyber security professionals, highlighting the need for more investment in cybersecurity education.

In terms of cybersecurity education, the level of education required was brought into question. The audience member wanted to know whether cybersecurity education should be basic or advanced, underscoring the importance of understanding the appropriate level of training needed in this field.

Overall, the discussion covered a wide range of topics related to digital diplomacy, cyber diplomacy, cyber capacity building, digital education, administrative risk, cyber security, DNS, OTT, CEO awareness, investment in cybersecurity tools in developing countries, AI in cyber intelligence, cyber certification, and cybersecurity education. The arguments and evidence presented shed light on the critical role these areas play in today’s digital world.

Sandy Palma

Central America is facing significant challenges in the field of cybersecurity. The region is underdeveloped in terms of cybersecurity, with a shortage of trained professionals in the field and limited availability of universities offering education in cybersecurity. This lack of expertise and education contributes to the vulnerability of Central America’s digital infrastructure.

One key issue is the underreporting of cybersecurity attacks in the region. Due to the absence of policies and laws around cybersecurity and the non-disclosure of cyber attacks, incidents often go unreported. It is only when individuals are personally affected and voice their experiences on social media that the wider public becomes aware of these violations. The low reporting rate hinders efforts to effectively address and mitigate cyber threats.

The exponential growth of cyberattacks in Central America has necessitated resilience in all sectors. The switch to virtualization as a response to the pandemic has made several academic centres, from preschools to high schools, victims of cyberattacks. To combat these threats, schools and universities have had to implement internal policies, rules, and protocols. This demonstrates the urgent need for increased resilience and cybersecurity measures in the region.

Another concern is the lack of participation from government authorities in platforms like the Internet Governance Forum (IGF). Over the past five years, only one decision-maker or government representative from Central America has taken part in the IGF. This lack of participation hampers the region’s ability to shape policies and strategies related to cybersecurity on a global scale.

Creating awareness through education and training is seen as essential in addressing cybersecurity issues. It is suggested that cybersecurity should be included in the curriculum, covering areas such as laws and computer rights. This would help to equip individuals with the necessary knowledge and skills to protect themselves and contribute to cybersecurity efforts. Furthermore, policymakers, who are mainly government authorities, should prioritize cybersecurity education within the region.

In conclusion, Central America faces significant challenges in cybersecurity. The region has a shortage of trained professionals and limited educational opportunities in the field, leading to vulnerabilities in its digital infrastructure. Cybersecurity attacks often go unreported due to the lack of policies and public awareness. The region must focus on building resilience and increasing participation in platforms like the IGF. Creating awareness through education and training is crucial in combating cybersecurity threats. By including cybersecurity in the educational curriculum and prioritising it as a policy agenda, Central America can address these challenges and enhance its cybersecurity capabilities.

Cláudio Lucena

Universities have faced criticism for their slow integration of cybersecurity into their formal curricula, resulting in a shortage of cybersecurity professionals. This has become a pressing issue as the scale and nature of cybersecurity threats have evolved with the increasing reliance on online activities. Traditional approaches to education may no longer be adequate to address the demand for skilled professionals in the field.

Furthermore, the importance of cybersecurity extends beyond just technical expertise. It is essential for universities, particularly those in the Global South, to play a significant role in promoting cybersecurity awareness. By understanding the importance of the digital ecosystem and cybersecurity, universities can adapt their curricula accordingly. Public universities in the Global South have the potential to effectively reach out and raise awareness about cybersecurity among their communities.

In addressing the digital transformation, it is crucial to consider the elderly population, who are often neglected in cybersecurity initiatives. Elderly individuals may lack the instinctive ability to navigate online activities safely and protect themselves from threats. However, initiatives like the UAMA program implemented by Paraíba State University in Brazil have shown promise in educating elderly people about cybersecurity. The results of the program’s first semester demonstrated a significant increase in awareness and participants’ ability to protect themselves online.

On the other hand, allowing elderly individuals to manage their own digital transformation without proper guidance can have negative consequences. It highlights the importance of providing targeted education and resources to ensure that the elderly are equipped with the necessary skills to navigate the online world safely.

Overall, academia in the Global South has tremendous potential for community engagement in cybersecurity awareness. Universities such as Paraíba State University have harnessed this power by implementing programs like UAMA. By actively engaging with communities, universities can contribute to reducing the cybersecurity skills gap and promoting a safer digital ecosystem.

In conclusion, universities need to restructure their cybersecurity education to keep pace with the evolving threat landscape. The integration of cybersecurity into formal curricula, especially in the Global South, is vital in creating awareness and bridging the skills gap. Additionally, targeted programs that focus on educating the elderly about cybersecurity are essential to ensure that everyone can participate safely in the digital transformation. To maximize their impact, universities in the Global South should leverage their potential for community engagement and work towards building a more secure online environment.

Christopher Painter

Capacity building in cybersecurity is highlighted as crucial for combatting threats and driving economic growth. It enables countries to navigate the challenges of digitisation and the digital economy effectively. The COVID-19 pandemic has further emphasized the reliance on technology, leading to the recognition of the necessity for robust cybersecurity measures.

Political buy-in is seen as essential for the long-term sustainability of cybersecurity objectives. Without political support, capacity-building efforts in cybersecurity would not be sustainable. Capacity building should be integrated into a country’s economic priorities to ensure commitment and success.

Cybersecurity has a tangible impact on creating trustworthy systems and facilitating economic success. Progress has been made in several countries in establishing reliable systems to counter various threats, demonstrating the positive potential of cybersecurity in enhancing economic growth.

The integration of cybersecurity into political and economic priorities is crucial, as it is not solely a technical issue but also a geopolitical and economic concern. Handling cybersecurity issues is compared to nuclear matters, underscoring its multifaceted nature and broader implications.

Efforts are being made to improve policymakers’ understanding of cybersecurity to address the evolving cyber threat landscape. There is growing recognition of the importance of cybersecurity among policymakers, as evidenced by increased awareness and prioritization of cybersecurity issues under various administrations.

The Department of Homeland Security has established an action board to review major cyber incidents. This board includes renowned experts like Jeff Moss and focuses on investigating and learning from cyber incidents while preparing reports.

There is a shift in how cybersecurity breaches are handled, with increasing requirements for disclosure due to changing laws and regulations. The Securities and Exchange Commission mandates publicly traded companies to disclose significant breach events, and Europe is introducing laws that compel companies to disclose cybersecurity breaches.

Digital diplomacy and cyber diplomacy are considered similar, focusing on economic aspects, telecommunications, cyber security, and geopolitical issues. The convergence of the development community and the cyber community is seen as critical, aiming to bring together different perspectives and expertise.

In summary, capacity building, political buy-in, and a multidimensional understanding of cybersecurity are central to addressing threats and driving economic growth. Efforts to educate policymakers and establish clear protocols and mechanisms are necessary to address cyber incidents. The evolving regulatory landscape and emphasis on transparency shape the future of cybersecurity.

Mark Datysgeld

The Domain Name System (DNS) is a crucial component of the internet, responsible for managing the translation of domain names into IP addresses. It operates most of the internet, enabling users to access websites, send emails, and use various applications. However, the security of the DNS has not always been given the necessary attention, leaving it vulnerable to abuse and exploitation by cybercriminals.

Neglecting DNS security can have severe consequences for the integrity and reliability of the internet. Cybercriminals can exploit weaknesses in the DNS to launch devastating attacks, such as phishing, botnets, malware distribution, and malicious spam. This not only puts users at risk but also undermines trust in online platforms and services.

To tackle these issues, there is an ongoing initiative to combat different forms of DNS abuse. The initiative focuses on specific use cases and recommends that registrars and registries, who operate the DNS, adopt measures to block these harmful practices. By implementing these measures, it aims to strengthen DNS security and safeguard the internet ecosystem.

Mark, who presided over the working group dedicated to DNS security, advocates for increased DNS security and the broad implementation of the proposed measures. His optimism stems from the belief that rules blocking the malicious use of DNS will be adopted worldwide within the next year. His advocacy highlights the importance of prioritising DNS security and taking proactive steps to mitigate the risks associated with DNS abuse.

Another aspect being emphasised is the need for operators to include reporting mechanisms in their contact forms. Users play a critical role in identifying and reporting DNS abuse. With an increased requirement for operators to include reporting options, users will have an easier way to directly report instances of abuse. This not only facilitates the reporting process but also enhances interaction between users and operators, ensuring prompt action is taken against malicious activities.

Moreover, educating people about the wide-ranging roles and importance of the DNS is crucial. Many individuals perceive the DNS as only relevant when they have a URL in their address bar. However, the DNS is integral to the functioning of most apps and devices, powering the entire internet infrastructure. By raising awareness and providing education on the significance of the DNS, users can develop a better understanding and appreciate its vital role in supporting online activities.

In conclusion, prioritising DNS security is essential for maintaining the integrity and reliability of the internet. The ongoing initiative to combat DNS abuse, along with the advocacy for increased security measures and reporting mechanisms, showcases the collective effort to address these issues. By raising awareness and educating people about the importance of the DNS, we can build a safer and more secure internet ecosystem for all users.

Olga Cavalli

The discussion focuses on the topic of cybersecurity in Latin America, particularly in relation to its importance, capacity building, resilient infrastructure, and the impact of immigration. One key argument raised is that cybersecurity is not seen as a primary concern in the region, as it is overshadowed by economic and security issues.

However, there is increasing recognition of the need for resilient infrastructure to effectively cope with cyber threats. Recent events related to ransomware attacks have highlighted the value of having a solid and resilient infrastructure. It is argued that without such infrastructure, economic development cannot occur. This positive link between resilient infrastructure and economic development is seen as crucial for the region.

One concern raised is the scarcity of specialized cybersecurity education programs in the region. It is noted that only a few universities offer programs or careers focused on cybersecurity. This lack of specialized education is seen as a significant obstacle in developing a strong cybersecurity workforce.

The lack of transparency and open discussion surrounding cyber attacks is also a concern. It is pointed out that the only way people get to know about these attacks is through individuals sharing their experiences on social media. This lack of transparency and open discussion is seen as a problem that needs to be addressed.

Another significant observation is the loss of cybersecurity professionals from developing economies to countries with higher demand. It is argued that the demand for cybersecurity professionals in other countries is causing a brain drain, depleting the talent pool in developing economies. This loss of professionals is seen as a challenge that needs to be addressed to ensure the cybersecurity capabilities and resilience of these economies.

The role of universities in generating cybersecurity experts is emphasized, and it is suggested that universities should play a vital role in offering cybersecurity education. Specifically, it is advocated that cybersecurity should be included as part of the formal curriculum in universities. This inclusion is seen as essential for developing a skilled workforce to meet the growing demand for cybersecurity professionals.

Furthermore, attention is drawn to the vulnerability of older adults in the digital world and the need for cybersecurity education that includes them. It is highlighted that older adults often lack digital literacy and are therefore more susceptible to online risks. This vulnerability underscores the importance of including all demographic groups, including the elderly, in cybersecurity measures and education.

In conclusion, the discussion underscores the importance of cybersecurity in Latin America and highlights various challenges and areas that need to be addressed. These include the lack of prioritization of cybersecurity, the scarcity of specialized education programs, the need for resilient infrastructure, and the vulnerability of older adults. The role of universities in generating cybersecurity experts and the importance of transparency and inclusion in cybersecurity initiatives are also emphasized.

José Cepeda

Spain is taking steps to enhance its understanding and awareness of critical infrastructures, with a particular emphasis on parliaments. The country is evaluating the critical nature of all parliaments in order to develop a comprehensive understanding of the potential risks and vulnerabilities they face. This signifies a positive development in Spain’s approach to safeguarding essential entities.

However, there exists a significant gap between the technical understanding of cybersecurity and the realm of politics. Many politicians lack the necessary technical knowledge to effectively make informed decisions regarding cybersecurity. This knowledge deficit often hinders the policymaking process and can lead to suboptimal outcomes. Therefore, it is crucial to bridge this gap to enable more effective decision-making in matters of cybersecurity.

To address this issue, Spain is collaborating with the Interparliamentary Union to formulate resolutions that define critical infrastructure. The focus of these resolutions is on parliaments, recognizing their indispensable role in the functioning of the state. By establishing clear definitions and guidelines, Spain aims to strengthen the protection of parliaments as essential entities within the broader critical infrastructure framework.

Local institutions in Spain, due to their limited security infrastructure, are particularly vulnerable to cyber attacks. The majority of attacks in Spain occur on Fridays at 5 p.m. This timing allows cyber attackers to operate throughout the weekend, when there are typically fewer personnel available to detect and respond to such incidents. This vulnerability highlights the urgent need to enhance the security measures and resources available to local institutions.

In response, the Spanish government is developing a hierarchical security infrastructure that caters to institutions at all levels. This initiative ensures that designated individuals at both the national level and in each autonomous region are responsible for the security of municipalities and corporations. Establishing a comprehensive security infrastructure is a positive step towards bolstering cybersecurity across various institutions in Spain.

Furthermore, there is a proposal to create an institutional shield aimed at safeguarding critical infrastructures. This shield would enable institutions, companies, and even citizens to connect with public administrations and governments for enhanced protection. It offers a coordinated and collaborative approach to cybersecurity, ensuring that all stakeholders have direct access to a network of resources and support.

Moreover, Spain is actively involved in developing a global report for the Interparliamentary Union, focusing on cybercrime. The report is currently being analyzed and debated in meetings at the Department of Communications. Additionally, there are plans for a world summit on cybersecurity at the United Nations, demonstrating Spain’s commitment to addressing this pressing issue at an international level.

Recognizing the United Nations’ potential to lead in cybersecurity, there is a proposal to leverage the organization’s resources to establish it as a paradigm of cybersecurity. This would involve utilizing the U.N.’s expertise and infrastructure to provide cybersecurity resources to regions, such as remote parts of Asia and Africa, that are particularly in need of support.

Lastly, an interesting proposition is being considered to create a technological branch called ‘Cyber Blue Helmets’ within the United Nations. Inspired by the current Blue Helmets body, this branch would be dedicated to providing worldwide cybersecurity coverage. This idea holds promise in enhancing global cybersecurity efforts and demonstrates a forward-thinking approach towards addressing cybersecurity challenges.

In conclusion, Spain is taking significant steps to improve its understanding of critical infrastructures, particularly in relation to parliaments. While there is a need to bridge the gap between technical cybersecurity understanding and politics, Spain’s collaboration with the Interparliamentary Union in formulating resolutions for defining critical infrastructure is a positive development. Enhancing the security infrastructure for local institutions and proposing an institutional shield to protect critical infrastructures further demonstrates Spain’s commitment to cybersecurity. Participation in the development of a global report and the proposal to make the United Nations a paradigm of cybersecurity showcases Spain’s international engagement in addressing cybercrime. Additionally, the prospect of ‘Cyber Blue Helmets’ within the U.N. highlights innovative thinking in providing worldwide cybersecurity coverage.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Digital Inclusion Through a Multilingual Internet | IGF 2023 WS #297

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Ram Mohan

The topic of Universal Acceptance is not solely a technical issue but a human one that requires inclusivity to create a truly inclusive internet society. Users often face difficulties when their email addresses or domain names are not recognized as valid by certain systems. This problem is more about inclusivity than purely technical.

The next generation, known as digital natives, should be able to communicate and interact with names and systems in their native languages. Language should not be a barrier when it comes to converting email addresses and website addresses into hyperlinks. Regardless of the language script they are represented in, they should universally convert into hyperlinks. This would enhance usability and accessibility for users from different languages and cultures.

A failure in universal acceptance forces organizations to resort to inferior systems to represent themselves. If a company or organization’s name fails to convert into a hyperlink due to the language script, they are excluded from the digital ecosystem. This limitation hampers their online visibility and reduces their ability to communicate effectively with others in the global digital space.

Ram Mohan, a prominent figure, regards websites, domain names, and email addresses as communication tools between human beings rather than just identifiers. This perspective highlights the importance of Universal Acceptance in enabling effective and inclusive communication among individuals worldwide. It stresses the need to prioritize inclusivity and accessibility in the digital realm.

While the core technical challenges of Universal Acceptance and multilingualism have been mostly resolved, the main issue lies in policy coordination and incentives. The problem itself is relatively small compared to larger issues that organizations and technical firms have to deal with. Therefore, the focus should shift towards policy-based initiatives and economic incentives that can drive progress towards universal acceptance.

Policy-driven incentives, such as vendor preference for demonstrating universal acceptance in governmental procurement, can play a crucial role in prioritising universal acceptance. By creating impetus for businesses and organizations to prioritize inclusivity in their digital presence, policy-driven incentives can help promote universal acceptance on a broader scale.

The dialogue surrounding Universal Acceptance should also be simplified to make it more accessible and inclusive. Rather than using technical jargon, terms like digital accessibility and inclusion should be used to effectively communicate the importance of this issue to internet users. The satisfaction of users’ needs and preferences should be the central focus of discussions regarding Universal Acceptance.

In conclusion, Universal Acceptance is not just a technical matter but a human one that requires inclusivity and prioritising the needs of internet users. It involves enabling communication and interaction in native languages, converting addresses into hyperlinks regardless of the language script, and promoting accessibility and inclusion in the digital realm. While technical challenges have been largely resolved, policy coordination and incentives are vital to driving progress in achieving universal acceptance. By simplifying the dialogue and focusing on policy-based initiatives, a more inclusive and accessible internet can be created for all.

Edmon Chung

The analysis emphasises the importance of universal acceptance for digital inclusion and the development of a multilingual internet. It reveals that internet suppliers lack awareness of the impact of their actions on internet accessibility, resulting in partial support for internationalised domain names and email addresses. This limited support hinders users from fully utilising the internet in languages other than English, which inhibits digital inclusion and denies individuals the opportunity to access the internet in their native languages.

A multilingual internet is both a matter of language justice and a means to improve internet safety. Understanding the sender’s email address aids in identifying spam and scams, while multilingual email addresses facilitate better comprehension of sender details. Consequently, a multilingual internet provides a safer online experience for users.

While some argue that domain names and email addresses are becoming less relevant in cybersecurity, the analysis highlights their continued importance. Direct navigation on the internet still relies on domain names, and email addresses are critical in cybersecurity training. Elderly individuals are trained to verify the sender’s email address before taking any action, emphasising the ongoing significance of these elements in online security.

However, the analysis reveals that Internet Domain Names (IDNs) are not being efficiently or correctly utilised, causing them to be devalued and act as second-class citizens on the internet. Problems, such as the inadequate readiness of email and web hosting for IDNs, contribute to their underutilisation. This highlights the need for greater awareness and implementation of IDNs to fully realise their potential for achieving a multilingual internet.

While the technical groundwork for universal acceptance has been established, the analysis highlights challenges in implementing and adopting it in the market. While protocols exist at a low technical level, convincing the technical community of the importance of universal acceptance remains a hurdle. Market forces alone are not enough, and the lack of a smooth user experience creates a chicken and egg problem.

The analysis also highlights the need for policy interventions to motivate suppliers to support universal acceptance. Existing policies enable internationalised email addresses and domain names, but increased motivation is required for full implementation. Issues with the ease of use for multilingual email addresses further underscore the need for policy interventions to foster support.

In promoting local languages via domains, the analysis emphasises that the importance of community or culture should outweigh obstacles such as keyboard strokes and input complexity. Chinese and Japanese individuals continue to search in their native languages, even with the need for additional keyboard strokes. The popularity of single-character Chinese domain names, representing a word with just two to three strokes, demonstrates the value placed on promoting local languages in internet domain names.

Furthermore, the analysis notes that promoting local languages via domains aligns with the international decade of indigenous languages and the sustainable development goals supporting local culture. It asserts that choice should not be limited to ASCII domains but should include local names as options.

The importance of community empowerment and co-creation in building internet infrastructure and a multilingual internet is also emphasised. Community networks play a vital role in developing infrastructure that caters to the needs of the communities themselves. Community networks also contribute to making local languages more prevalent in the internet space. Thus, empowering community networks is seen as a valuable model for building internet infrastructure and fostering a multilingual internet.

In conclusion, the analysis underscores the significance of universal acceptance for digital inclusion and the development of a multilingual internet. Awareness among internet suppliers, efficient utilisation of Internet Domain Names (IDNs), and policy interventions are key factors in achieving universal acceptance. Overcoming obstacles such as keyboard strokes and input complexity is important for promoting local languages via domains. Community empowerment and co-creation offer valuable models for building internet infrastructure and encouraging a multilingual internet.

Susan Chalmers

The discussions centered on the significance of connectivity and digital inclusivity in native languages. The Tribal Broadband Connectivity Program emerged as a key initiative, allocating a substantial budget of $3 billion to enhance internet access in Native American tribal lands. As a part of this program, funding is provided for remote educational activities aimed at preserving indigenous languages, thus connecting tribal language and cultural resources to the internet. This initiative has been received positively, with its focus on addressing the digital divide and promoting inclusivity.

Another important aspect highlighted was the promotion of universal acceptance, which is vital for the development of a multilingual internet. Universal acceptance refers to a technical standard that enables domain names and email addresses to function in non-Latin scripts. This standard plays a significant role in bridging the language barrier and ensuring equal access to online resources for all language communities. Its promotion is considered a foundational element for a truly multilingual internet, contributing to reduced inequalities.

While efforts have been made for language acceptance, it is observed that many communities have adapted to the limited capabilities of the ASCII-only system. However, the ultimate objective remains to offer internet access to everyone in their own language and script. This highlights the importance of overcoming linguistic barriers and providing equal digital opportunities for all individuals.

Though the technical groundwork for universal acceptance has been completed, challenges in coordination and policy implementation persist. The coordination among stakeholders and the formulation of effective policies are essential to ensure the practical implementation of universal acceptance standards. The need for government intervention and policy changes to overcome these challenges and promote internet access in native languages was emphasized. The involvement of governments is crucial in creating a conducive environment for the development and adoption of policies that ensure language inclusivity online. It is important for this issue to gain visibility and propel governments to take the necessary actions.

In conclusion, the discussions shed light on the significance of connectivity and digital inclusivity in native languages. The Tribal Broadband Connectivity Program and the promotion of universal acceptance emerged as key initiatives to address this issue. Challenges remain in terms of coordination, policy, and implementation, for which government intervention is seen as crucial. Overcoming these barriers will contribute to reducing inequalities and ensuring that internet access is available in individuals’ own languages and scripts.

Speaker

The internet has the potential to significantly support local languages, particularly in Italy, where several unrecognized languages such as Furlan, Sardo, and Arberesh exist. These languages often struggle for recognition and preservation, but the internet can provide a platform for their promotion. By utilizing this powerful tool, local communities can distribute information, resources, and cultural content in their native languages, helping to preserve their linguistic heritage.

One of the key advantages of using the internet to support local languages is its ability to overcome geographical barriers. Through the internet, speakers of these languages can connect and communicate with each other, regardless of their physical distance. They have the opportunity to share their experiences, educate others about their languages and cultures, and build a sense of community.

Furthermore, the internet allows for widespread distribution of information in local languages. This ensures that speakers of these languages have access to essential resources, educational materials, and news in their native tongue. It empowers local communities by enabling them to develop and share content that reflects their unique perspectives and experiences.

In addition to the role of the internet, government and community support are crucial for the promotion and preservation of local languages. Without the active involvement and support of both entities, promoting these languages would be challenging, if not impossible. Governments can play a significant role by implementing policies that recognize and protect local languages, allocating resources for language revitalization initiatives, and encouraging their use in official capacities.

Similarly, community engagement is vital in raising awareness about the importance of local languages and fostering a sense of pride and ownership among speakers. When communities actively participate in the promotion of these languages, they contribute to preserving cultural diversity. Local languages embody the traditions, values, and cultural heritage of a community, and by supporting these languages, communities can safeguard their identity and promote intercultural dialogue.

Promoting local languages aligns with the Sustainable Development Goals (SDGs). Specifically, SDG 4 (Quality Education) aims to ensure inclusive and equitable quality education for all, including opportunities for lifelong learning in local languages. Additionally, SDG 16 (Peace, Justice, and Strong Institutions) emphasizes the importance of preserving cultural diversity and embracing linguistic rights as part of building peaceful and inclusive societies.

In conclusion, the internet can serve as a powerful tool in supporting local languages, helping to overcome barriers and distribute information in these often unrecognized languages. However, the success of promoting and preserving local languages depends on the active involvement of governments and communities. By recognizing the value of local languages and supporting their use, communities can preserve their cultural diversity and contribute to the achievement of SDGs related to education and peaceful societies.

Akinori MAEMURA

The importance of digital inclusion and universal acceptance of native languages on the internet has been emphasised by multiple speakers. In the past, using the internet in languages other than English posed difficulties due to character handling issues. However, advancements in computer systems have addressed these challenges, enabling users to access the internet in their own language. This development is seen as vital for overcoming the barrier of using the internet in native languages.

Furthermore, the inclusion of everyone on the internet is considered crucial because English is not universally understood. The preference for ASCII characters as identifiers is due to their simplicity, but it limits the ability to communicate effectively across diverse languages. Therefore, the usage of native languages is needed to ensure equal access to information and services on the internet. The speakers argue that platforms capable of handling multilingual input should be developed, highlighting the importance of universal acceptance.

Akinori Maemura, an advocate for digital inclusion, emphasises the need for a multi-stakeholder approach to implement this inclusivity. He believes that every stakeholder, including communities, platform vendors, and public policy, should play a part in making the digital platforms ready for multilinguals, Internationalized Domain Names (IDNs), and universal acceptance. Maemura also highlights the role of public policy in encouraging user systems to move towards universal acceptance. He suggests that public policy can serve as a catalyst for progress in achieving equal access to the internet.

The analysis reveals a consensus among the speakers regarding the significance of language inclusivity on the internet. They argue that overcoming language barriers is essential for ensuring equal access to information, opportunities, and services for everyone. By developing platforms that can handle multilingual input, and with the collective efforts of all stakeholders, digital inclusion and universal acceptance can be achieved. This would enable individuals to utilise the internet in their own language, removing the barriers that limit participation and access.

Theresa Swinehart

The discussion focuses on the importance of inclusivity and the use of any language on the internet. Around 5.4 billion people worldwide, from different cultures and languages, are affected by this issue. However, approximately 2.6 billion people have never had internet access, potentially due to limited access or language barriers. This highlights the urgent need for universal acceptance, which allows the use of domain names in any chosen language. It is worth noting that there are approximately 6,500 languages spoken globally, with a significant number in Asia, Africa, and the Pacific. Major languages like Chinese, Hindi, and Arabic also play a crucial role.

The multilingual internet not only has economic benefits but also societal advantages, such as preserving languages and promoting understanding of diverse cultures. Asia, Africa, the Pacific, the Americas, and Europe collectively have a wide range of languages, with approximately 2,300 languages in Asia, 2,100 in Africa, 1,300 in the Pacific, 1,000 in the Americas, and about 280 in Europe.

The Internet Corporation for Assigned Names and Numbers (ICANN) is committed to advancing universal acceptance. Its efforts include expanding top-level domain names to include more languages and scripts. ICANN supports Universal Acceptance Day and plans for the next round of top-level domains, creating opportunities for applications in various languages and scripts. These initiatives contribute significantly to a more inclusive and accessible internet.

User demand, awareness, and education are crucial for a seamless online experience. Understanding and studying user demands can improve user satisfaction. Similarly, incorporating queries when setting up new devices can increase user awareness. These elements contribute to the overall user experience and help individuals navigate the online world more effectively.

The establishment of Universal Acceptance Day and the development of policies targeting internationalized domain name elements have received significant support. Universal Acceptance Day has seen high levels of participation, while guidelines for applications for internationalized domain names are still being developed. These efforts aim to create a more inclusive and globally connected internet.

In summary, the discussion highlights the need for inclusivity and the unrestricted use of any language on the internet. Efforts such as universal acceptance, promoting multilingualism, and policies supporting internationalized domain names are important for bridging the digital divide and creating a more equitable and accessible online world. By valuing and embracing linguistic and cultural diversity, we can foster understanding, cultural preservation, and economic growth on a global scale.

Dawit Bekele

Access to the internet is considered a critical need in today’s world, as essential activities such as government services, education, and work increasingly move online. However, it is concerning that more than a third of the global population still lacks access to the internet. This lack of connectivity is particularly pronounced in Africa, where the cost of connectivity serves as a major barrier to online education and meaningful digital participation. In many regions of Africa, the high cost of internet access hinders people from engaging in vital activities like online learning.

Despite these challenges, there has been significant progress in connecting more people to the internet worldwide. Efforts have been made to bridge the digital divide and improve internet accessibility. However, there are still considerable inequalities to address. It is crucial for the global community to work together to tackle digital inequality and ensure that access to the internet is affordable and safe for everyone.

Language barriers further contribute to the digital divide, as certain languages lack suitable digital content and representation on the internet. The digital divide often aligns with linguistic lines and socioeconomic pressures, leading to limited access to internet content in certain languages. Additionally, the lack of devices or platforms that support specific languages can further hamper internet usage. Furthermore, the lack of digital literacy in poorer communities prevents their languages from being fairly represented online.

However, there is hope for creating a fairer internet for all languages through technological advances and focused efforts from stakeholders. For instance, advancements in automatic translation and AI interpretation are making it possible to access content in different languages. Localization, which involves adapting digital content to specific languages and cultures, is being taken more seriously by tech companies, governments, and service providers. Additionally, community networks are emerging as a technological solution to provide connectivity even in remote areas.

An important aspect in addressing language barriers and promoting inclusivity is empowering communities to have control over their languages and how they are used. Currently, tech companies often decide which languages are allowed on their platforms, stifling community decision-making. Communities should have the autonomy to determine how they can use their languages and have more influence in shaping the digital landscape.

Overall, internet access is critical in the modern world. While progress has been made in connecting more people online, there are still significant challenges to overcome, such as the cost of connectivity, digital inequality, and language barriers. By working together and harnessing technological advancements, a fairer internet that is accessible to all languages can be created. Empowering communities to have decision-making power over their languages is also crucial for promoting inclusivity and giving voice to diverse linguistic communities.

Audience

In the analysis, the speakers explored several topics related to the internet. One topic discussed was the relevance of domain names in the context of social media. The speakers questioned the importance of domain names, particularly internationalised domain names (IDNs), in diversifying and making the internet multilingual, given the rise of social media platforms like Facebook and Twitter where domain names are not typically used for identification. They raised the question of whether domain names are still crucial or if they have become less relevant in the age of social media.

Another topic addressed was the impact of content moderation on non-European languages. The speakers noted that while platforms like Facebook have content moderation in around 75 languages, people use these platforms in over 1000 different languages. The lack of content moderation and functional support for smaller languages on the open internet can drive users towards platforms like Facebook, where content moderation may be available in their language. The speakers highlighted the example of Myanmar, where Facebook has become a stand-in for the internet due to its dominance and lack of alternatives.

The linguistic fitness of input methods for internationalised domain names (IDNs) was another point of discussion. One audience member argued that the lack of demand for IDNs could be attributed to the linguistic fitness of input methods. They compared the ease of typing a country code on a keyboard (requiring only three button presses) to using the native language, which could potentially require a dozen button presses. This argument suggested that users will always opt for the shorter and easier option. However, another audience member believed that the introduction of voice or brain input methods could potentially encourage the use of IDNs.

The need for a multilingual and decentralised internet was also emphasised. The speakers argued that the internet should cater to multiple languages and be decentralised to address language and cultural diversity. They highlighted the importance of community networks in creating proper infrastructure and the constraints imposed by current technical and policy limitations on local server and email hosting. They also pointed out that big tech’s protocols and configurations, such as Gmail’s, can pose challenges. To achieve a multilingual internet, they suggested practical measures like facilitating local servers and updating protocols to accommodate diversity.

Convention and iconography were discussed as valuable tools in accessing the internet. Iconography was seen as an entry point or a way to get started, similar to knowing which side of the car the petrol tank is on. The speakers emphasised that established conventions and iconography can aid users in navigating the internet.

The speakers also highlighted the significance of domain names and the Domain Name System (DNS) in language and cultural preservation. They gave the example of “.cat,” a domain name for Catalonia, where the requirement for Catalan content on linked websites led to a significant growth of Catalan content. They argued that domain names and DNS play a crucial role in preserving languages and cultures.

However, there were also observations made that caution against overly relying on the domain name system to solve the context problem of language. The scalability of using domain names to address language context was questioned, and other factors such as identity management were suggested as alternative considerations. Additionally, it was suggested that examining the DNS infrastructure itself for solutions to language-related challenges has been lacking.

In conclusion, the speakers in the analysis touched upon various aspects of the internet, including the relevance of domain names in the age of social media, the impact of content moderation on non-European languages, the linguistic fitness of input methods for internationalised domain names, the need for a multilingual and decentralised internet, the value of convention and iconography, and the role of domain names and DNS in language and cultural preservation. They presented different arguments and perspectives, raising important questions, and proposing practical measures for a more inclusive and diverse internet.

Speakers

&

’Akinori

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Dawit

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Edmon

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Ram

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Susan

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Theresa

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Digital apologism and civic space: the peruvian case | IGF 2023

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report


Audience

The speakers expressed their gratitude multiple times to convey a deep sense of appreciation towards the recipients. Their repeated expressions of thanks reflected their sincere and profound gratitude. The speakers emphasised the importance of the recipients’ actions through the repetition of “Thank you,” showcasing the significance of their involvement. This repetition also conveyed a sense of urgency and intensity, as the speakers wanted to ensure their gratitude was properly communicated. Additionally, the repeated expressions of thanks affirmed the speakers’ gratitude and validated the positive impact the recipients had on their lives. By consistently expressing their appreciation, the speakers aimed to reinforce their gratitude and leave no doubt in the recipients’ minds about the depth of their thankfulness. In conclusion, the repeated “Thank you’s” highlighted the overwhelming appreciation of the speakers, emphasising the profound impact of the recipients. The repetitive nature of their expressions of gratitude reinforced the sincerity of their thanks, leaving no room for ambiguity.

Dilmar Villena

The Peruvian legislation on terrorism apology is facing criticism due to its failure to comply with human rights standards. One of the main concerns is that the current law does not require actual danger to be present for punishment; potential dangerous behaviour is sufficient for prosecution. This broad definition of what constitutes a threat allows for invasion of privacy and undermines the principles of proportionality and legality.

Furthermore, there is a sense of inequality in the criminalisation of the same action whether it occurs online or offline. This creates a discrepancy and can lead to unfair treatment and discrimination.

The lack of judicial reasoning in the prosecution of ICT (Information and Communication Technology) terrorism apology crimes is another significant issue. Insufficient steps are taken to verify account ownership during prosecution, and individuals can be punished even if they simply share or repost violent content without actually endorsing or supporting terrorism. Additionally, civil reparation amounts are standardised, disregarding any analysis of the harm done, further contributing to the perception of injustice.

The legislation’s broad and vague definition of terrorism apology also raises concerns about the potential suppression of freedom of speech. The public has been encouraged to report terrorism apology to a specific email address, which has the potential for misuse and may lead to the labelling of critics or government protesters as terrorists. This can stifle criticism against the government and limit free expression.

It is argued that there is a need for a careful and specific definition of terrorism, especially when it involves freedom of speech. The current situation in Peru demonstrates the potential for the suppression of speech against the government under the guise of counter-terrorism measures.

Overall, there is a concern about the possible dangers of excessive and poorly defined anti-terrorism laws. While legislation and regulation are often seen as solutions to perceived terrorist threats, they should be crafted with caution. The definition of terrorism and terrorism apology should be precise and account for the protection of freedom of speech rights. Striking a balance between counter-terrorism measures and the preservation of fundamental rights is crucial.

Camila

The analysis delves into various aspects of state protection, democracy, freedom of expression, and terrorism in Brazil. It emphasises the need to maintain a delicate balance, considering the unique circumstances of each jurisdiction. One key issue highlighted is the legal uncertainty in cybercrime cases, which arises from the wide range of potential punishments that judges can impose. This ambiguity has implications for fair and consistent application of the law in such cases.

Another significant challenge discussed is the definition and proof of terrorism, especially when examining communications. Brazil has witnessed cases resembling the Capitol invasion in the United States, with individuals being accused of attacks against the democratic state and terrorism. However, accurately determining evidence and establishing proof in such cases is a complex process. This difficulty raises questions about the effectiveness of current methods in defining and proving acts of terrorism based on communication-related evidence.

Furthermore, the analysis examines a proposed platform regulation bill that includes a duty of care provision. This bill addresses issues like content moderation, platform accountability, and transparency. It bears similarities to the Digital Services Act and aims to regulate online platform activities. However, concerns have been raised regarding the platforms’ ability to accurately identify content that constitutes terrorism. This issue raises doubts about the bill’s effectiveness in achieving its objectives and ensuring proper handling of terrorist-related content on digital platforms.

In conclusion, the analysis emphasises the importance of striking a balance between state protection, democracy, and freedom of expression while considering the unique contexts of different jurisdictions. The legal uncertainty surrounding cybercrime cases, the challenges of defining and proving terrorism based on communications, and the potential drawbacks of the proposed platform regulation bill are significant concerns. These observations shed light on the complexities involved and highlight the need for further examination and consideration to develop appropriate and comprehensive solutions.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more