IGF’s knowledge unlocked: AI-driven insights for our digital future | IGF 2023 side event

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Markus Kummer, Senior Advisor, GIP & DiploFoundation

The initial stages of the Internet Governance Forum (IGF) primarily focused on connectivity and internet access, with no consideration given to artificial intelligence (AI). During that time, the main concerns revolved around ensuring that people had access to the internet and were able to connect. However, as time went on, the landscape changed significantly with the advent of apps, video streaming, smartphones, and other technological advancements facilitated by AI. These developments highlight the growing importance of AI in shaping the digital world.

Despite the progress made in connecting people to the internet, challenges still exist in bringing the last billion individuals online. The assumption was that the industry would take the lead in connecting this population, but it has proven to be a difficult task. One of the major hurdles in this endeavor is language and cultural diversity. The remaining individuals who are not yet connected to the internet predominantly come from non-English speaking countries. Overcoming these linguistic and cultural barriers is essential to ensure universal access to the internet.

The Tunis agenda, a significant document related to Internet governance, outlined a broader definition of the concept beyond just the management of the Domain Name System (DNS) and internet protocol resources. It acknowledged that Internet governance encompassed a range of issues concerning the use and abuse of the internet. This expanded understanding remains relevant and continues to guide discussions and decision-making in the field.

The IGF has accumulated an immense amount of data over the years. It has been suggested that this data should be mined for valuable insights. In 2011, Vint Cerf, one of the founding fathers of the internet, highlighted the importance of data mining during the Nairobi IGF. Data mining involves extracting meaningful information and patterns from extensive datasets. Given the rich and diverse dataset available within the IGF, there is the potential to uncover valuable insights that can inform future policies and strategies around internet governance.

AI applications can play a crucial role in mining and categorizing the vast amount of data accumulated through the IGF. Markus Kummer, a prominent figure in internet governance, has mentioned the publication of a book summarizing the knowledge generated through the IGF. This highlights the challenge of effectively mining and utilizing the wealth of information available. By leveraging AI tools, the process of data mining and categorization can be significantly enhanced, allowing for more efficient and accurate analysis of the vast dataset.

In conclusion, while AI was not initially considered during the early stages of the IGF, its importance has become increasingly significant with the evolution of the digital landscape. Challenges persist in connecting the last billion individuals to the internet, particularly in dealing with language and cultural diversity. The broader definition of internet governance outlined in the Tunis agenda remains valid and continues to shape discussions within the field. The immense data accumulated through the IGF presents an opportunity for valuable insights when mined and analyzed effectively, with AI applications serving as useful tools in this process.

Jovan Kurbalija, Executive Director, DiploFoundation

The importance of preserving the knowledge generated during Internet Governance Forum (IGF) sessions was emphasised. This knowledge has the potential to assist and benefit communities affected by digitalisation issues. The Diplo Foundation, in collaboration with Markus Kummer, has been documenting IGF sessions since 2006. To facilitate this process, AI technology is employed, enabling the creation of summaries, reports, and daily digests. The AI system has the capability to codify and translate the arguments presented during sessions, resulting in the development of a comprehensive knowledge graph.

The knowledge database generated from IGF discussions is considered a public good that belongs to all stakeholders. However, it was noted that this valuable resource is currently underutilised. Therefore, there is a collective call for the initiation and promotion of the IGF knowledge database, aiming to fully harness its potential benefits.

While there are extensive discussions about the impact of Artificial Intelligence (AI) on humanity, the need to explore AI as a practical tool and gain a comprehensive understanding of its functionalities was recognised. It was suggested that the Internet Governance (IG) community should focus on delving into the practical aspects of AI, rather than mere speculation about its potential impacts.

To enhance knowledge sharing and coherence, it was proposed that an AI tool be developed to connect and compare discussions across various IGF sessions. This tool would help identify commonalities, link related topics, and facilitate a more comprehensive understanding of the subject matter.

The use of AI for the session report system was viewed positively, as it allows experts to collaborate with AI technology to generate interactive reports. These reports include detailed breakdowns per speaker, narrative summaries, and discussion points, as well as information regarding speech length and speed. The AI system continuously learns and improves through the integration of corrective feedback.

The IGF has evolved into a knowledge base that holds significant influence over Internet-related organizations. It serves as a platform for learning, capacity building, and the provision of global resources. Notably, the IGF’s culture of respect and engagement, which fosters a listening culture and promotes the acceptance of diverse opinions, was highly appreciated. There was a suggestion to utilize AI and human expertise to propagate this culture among younger generations, strengthening the overall impact and sustainability of the IGF’s mission.

In conclusion, the extended summary highlights the importance of preserving knowledge generated during IGF sessions and emphasizes the collaborative efforts between the Diplo Foundation and AI technology in documenting and summarizing these sessions. It underlines the call for the initiation and utilization of the IGF knowledge database, as well as the need to explore the practical aspects of AI. The potential benefits of an AI tool to link and compare discussions across various sessions are recognized. The positive perspective towards utilizing AI for the session report system is noted, along with the IGF’s influence as a knowledge base and its culture of respect and engagement.

Sorina Teleanu, Sorina Teleanu, Director of Knowledge, DiploFoundation

The International Governance Forum (IGF) held discussions on the role of Artificial Intelligence (AI) in society, with a focus on its benefits rather than its potential to replace humans. The sentiment expressed during the discussions was positive.

Speakers at the IGF emphasized the need to approach AI in a practical manner and avoid cliches. They encouraged participants to explore how AI actually works, rather than focusing solely on its ‘magic’. This proactive stance aims to deepen understanding and harness the full potential of AI.

There was a consensus among the speakers that AI is not detrimental to jobs, but rather a tool to assist humans. They dismissed the idea of AI taking over human jobs in the near future and highlighted the importance of AI supporting and enhancing human capabilities.

One significant concern raised at the IGF was the underutilization of the valuable information produced. While the forum generates a wealth of knowledge, it was acknowledged that much of it remains unused or unexplored. This raises questions about the effectiveness of disseminating and utilizing the knowledge generated by the IGF.

The speakers also stressed the potential of technology in maximizing the knowledge acquired by the IGF over the years. They emphasized the need to leverage technology to track the evolution of discussions and enhance understanding of topics such as the digital divide. By harnessing technology, the wealth of knowledge accumulated by the IGF can be effectively utilized to contribute to the achievement of the Sustainable Development Goals.

Additionally, there was an emphasis on the need to move the discussions forward and avoid repetition. The speakers highlighted technology as a means to facilitate progress, avoid cliches, and promote innovation in governance and societal debates. Using technology as a starting point for discussions can provide an overview of previous debates and lay the groundwork for more in-depth and constructive conversations.

In conclusion, the discussions at the IGF established that AI will bring about benefits without replacing humans. The importance of approaching AI in a practical manner, avoiding cliches, and harnessing technology to maximize the utilization of knowledge were key takeaways. Moving forward, the IGF aims to leverage technology to advance governance and effectively address societal challenges.

Wim Degezelle, Internet Governance Expert, Policy Analyst & Consultant

During discussions about Internet Governance Forum (IGF) activities, it was identified that there is a need to improve the codification and collection of knowledge. The participants emphasised the importance of moving beyond mere discussions and working towards tangible outputs. This indicates a desire to generate concrete reports and outcomes from IGF discussions.

Another point raised was the need for better coordination and consolidation of similar discussions that take place at different workshops within the IGF. It was observed that multiple sessions on internet fragmentation often resulted in repeated messages about collaborative work, albeit using different phrasing. The crowded schedule of IGF sessions was identified as a challenge, making it difficult to establish links to previous discussions from past years or sessions. Therefore, participants suggested that better coordination and consolidation of similar discussions would improve efficiency and reduce redundancy within the IGF.

Participants also acknowledged the potential role of AI and other technologies in enhancing knowledge management. It was noted that during meetings, a specific tool was able to break down participants’ words into distinct arguments and label key topics. Additionally, the tool was capable of associating relevant Sustainable Development Goals (SDGs) with the discussions. This demonstrates how AI and technology can help categorise and link discussions, facilitating better knowledge management within the IGF.

Moreover, there was a shared positive sentiment towards the potential of the tool to compare and link discussions from different sessions. Participants expressed a desire for the tool to identify common themes across multiple sessions and suggest comparative analysis. This highlights the potential for AI and technology to further enhance knowledge management within IGF by providing a comprehensive and comparative understanding of discussions.

In conclusion, the discussions surrounding knowledge codification and collection within IGF activities stressed the need for tangible outputs and better coordination of similar discussions. Furthermore, the value of AI and other technologies in categorising, linking, and enhancing knowledge was recognised. The potential for these technologies to compare and link discussions from various sessions was also highlighted. Overall, this analysis provides insights into improving knowledge management within the context of IGF.

Audience

The Internet Governance Forum (IGF) has become a vital platform, enabling stakeholders to participate and contribute to policy discussions related to the internet. This inclusive forum allows dialogue and collaboration among governments, non-governmental organizations, businesses, academic institutions, and individuals interested in shaping the internet’s future.

One key aspect that sets the IGF apart is its ability to influence internet-related organizations. Stakeholders have found the IGF to be an important channel for contributing to policy development and decision-making processes. This influence has been significant, shaping the strategies and actions of internet governance entities.

The IGF’s positive impact is reinforced by its evolution and longevity, surpassing initial expectations. It was originally anticipated that the IGF would only last for a limited period, but its resilience and continued success prove its value. The IGF is now regarded as a model worth emulating, leading to the establishment of similar forums worldwide and the contribution of resources from various regions, strengthening global internet governance.

Another significant aspect of the IGF is its role in promoting global collaboration and discussion. The forum provides a platform for stakeholders to engage in fruitful dialogue, allowing for agreement and disagreement. Through open exchanges and constructive debates, the IGF facilitates consensus building, shaping policies that impact internet governance. Additionally, the IGF’s influence extends beyond its immediate activities and impacts other internet governance organizations operating in related domains.

In conclusion, the Internet Governance Forum (IGF) has become a valuable knowledge base and a platform for global collaboration and discussion. Its importance lies in bringing together diverse stakeholders, providing opportunities for active participation, and influencing internet-related organizations worldwide. The continued success and growth of the IGF over the past two decades highlight the need for its continuation and evolution in the future.

Anja Gengo, Associate Programme Expert, IGF Secretariat

The Internet Governance Forum (IGF) is an extensive database that contains a vast collection of reports, records, and documents on digital inclusion. For the past 18 years, the IGF has been actively producing various types of reports and documents, which serve as significant indicators of the current state of affairs and future directions in the field. This highlights the IGF’s commitment to remaining up-to-date and providing valuable insights into the digital inclusion landscape.

One argument presented is that artificial intelligence (AI) can be a valuable tool in managing the IGF’s massive database, provided that it is a trusted system. AI has the ability to process data quickly and yield accurate results, thereby enhancing the IGF’s data processing capabilities and achieving a higher level of inclusion in its processes.

Furthermore, there is a strong emphasis on the importance of identifying and including underrepresented and marginalized groups in the IGF processes. The IGF Secretariat acknowledges the lack of participation from certain countries, disciplines, and target groups and is making efforts to map these missing entities and onboard them. This commitment underlines the IGF’s dedication to promoting inclusivity and reducing inequalities in the digital space.

Anja Gengo, an observer, is impressed by the examination of speech length and speed in the discussions. This analysis provides insights into communication dynamics and has the potential to improve the effectiveness of discussions during IGF events. Additionally, Gengo is excited about a mini competition, the outcome of which is eagerly anticipated.

Overall, the analysis of the IGF’s database and its efforts towards inclusion are deemed highly valuable for the IGF’s long-term utility. It not only enhances decision-making but also supports the IGF in effectively addressing the challenges and opportunities within the digital inclusion landscape.

Speakers

&

’Anja

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Jovan

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Markus

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Sorina

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Wim

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Launch of Fellowship for Refugees on Border Surveillance | IGF 2023

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Audience

This comprehensive analysis covers a wide range of topics related to education, generative AI, risk management, information literacy, multi-stakeholder engagement, the actions of the European private sector in oppressive regimes, the impact of misinformation and disinformation, and the coexistence of privacy and safety in technology design.

One of the discussions revolves around educating people about generative AI and the need to mitigate its risks. The audience seeks advice on how to educate individuals about this technology, indicating recognition of its potential risks. However, the sentiment is neutral, suggesting a need for more information and guidance in this area.

Another argument highlights the importance of promoting critical thinking and curiosity among children in the face of the age of disinformation and rapid technological change. The supporting facts include a quote from Jacinda Ardern, who emphasises the shift from relying on facts obtained from traditional library resources to the current digital age with multifaceted sources. She urges individuals to seek knowledge about the process and origin of the information presented. This positive argument underscores the need to equip children with the necessary skills to navigate and critically evaluate information in the digital era.

The analysis also addresses the need for a multi-stakeholder approach to problem-solving and the challenges faced by civil society, particularly from the Global South, in effectively participating in solution-finding dialogues. These challenges include disparities in accessibility and effectiveness compared to governments and corporate organisations. This observation points towards the importance of inclusivity and equal representation in decision-making processes.

Another notable point relates to monitoring the actions of the European private sector, particularly within countries with oppressive regimes. The argument raises questions about how to effectively monitor the activities of companies operating in these contexts, such as China, Vietnam, and Myanmar. This highlights concerns about the impact of the private sector on human rights and the need for oversight and accountability.

The analysis also delves into the impact of misinformation and disinformation, noting that individuals who distrust institutions are more susceptible to these phenomena. This observation emphasises the importance of building trust in structures and institutions to combat the spread of false information.

Furthermore, the debate on designing technology that balances privacy and safety in the online world is also addressed. The argument suggests that current technology and design choices might limit the coexistence of privacy and safety, forcing the prioritisation of one over the other. This highlights the ongoing challenge of developing technology that can effectively address both concerns.

In conclusion, this analysis highlights the need to educate about generative AI, mitigate its risks, foster critical thinking and curiosity among children, ensure inclusivity in problem-solving dialogues, monitor the actions of the European private sector, build trust in institutions to combat misinformation, and address the challenge of designing technology that balances privacy and safety. These observations reflect the complexity and interdisciplinary nature of the issues discussed, as well as the importance of considering diverse perspectives to inform effective strategies and solutions.

Karoline Edtstadler

During the analysis, several key points were discussed regarding the views expressed by Karoline Edtstadler. Firstly, she emphasised the need for greater recognition and opportunities for ambitious women. Edtstadler observed that women who strive for success are often viewed negatively, being labelled as pushy or attempting to replace men. She believes that society should overcome this perception and provide more support and encouragement to women with ambitious goals.

Secondly, Edtstadler underscored the value of women’s unique perspectives in leadership roles. She argued that women’s ability to perceive life from their point of view – particularly as those capable of giving birth and responsible for nurturing and upbringing – makes them special. The shared yet different life experiences, such as motherhood, contribute to their valuable insights and decision-making capabilities.

In terms of AI regulation, the European Union’s efforts were commended. The EU is taking the lead in regulating AI and prioritising the classification of risks associated with AI applications. This focus on risk evaluation aims to strike a balance between promoting beneficial AI technologies and addressing potential societal impacts.

Austria was recognised for its proactive approach to digital market regulation. Even before the implementation of the EU’s Digital Services Act (DSA) and the Digital Markets Act (DMA), Austria had already established the Communications Platform Act, effective from 1st January 2021. Under this act, social media platforms are obliged to promptly address online hate speech. Austria’s early actions demonstrate the country’s commitment to creating legal frameworks concerning digital services.

Collaboration and multi-stakeholder involvement were identified as crucial factors in addressing the challenges posed by AI, digital markets, and misinformation. Edtstadler advocated for a concerted effort involving governments, parliamentarians, civil society, and tech enterprises. She emphasised the importance of collective efforts and shared understanding in tackling these complex issues.

The analysis also highlighted the importance of education and awareness in effectively handling the impacts of social media and new technologies like AI. This includes equipping the public with knowledge and skills to navigate technology, particularly among the elderly. Additionally, it was emphasised that regulations should strike a balance between ensuring safety and privacy while still fostering innovation.

Restoring trust in institutions, governments, and democracy was identified as a crucial objective. Given the rise of misinformation and disinformation during events like the Covid-19 pandemic, Europe aims to counter these challenges through robust regulations. By addressing the issue of misinformation, trust can be rebuilt among citizens.

It was also noted that technology, including AI, should not replace human decision-making, particularly in matters like judgment in law enforcement. While AI can offer efficiency in finding judgments and organising knowledge, drawing a clear line between human judgment and AI is important.

Handling the downsides of technology was deemed necessary to ensure its benefits for society. Technologies like AI can be used for good, such as performing precise surgeries and speeding up tasks in law firms. However, challenges and risks should be addressed to make technology beneficial for all.

The analysis further underlined the importance of a multi-faceted approach in decision-making processes. Edtstadler highlighted Austria’s implementation of the Sustainable Development Goals (SDGs), wherein civil society was invited to contribute and share their actions in dialogue forums. This multi-stakeholder approach promotes inclusivity and diversity of perspectives in decision-making.

In conclusion, the analysis emphasised the need for recognition and empowerment of ambitious women, effective regulation of AI and digital markets, collaboration among stakeholders, education and awareness, addressing challenges in democracy and technology, and restoring trust in institutions and governments. These key points and insights offer valuable perspectives for policymakers and individuals seeking to promote a fair and inclusive society in the face of technological advancements.

Jacinda Ardern

The Christchurch Call to Action is a global initiative aimed at tackling extremist content online. It was established in response to a terrorist attack in New Zealand that was live-streamed on Facebook. Supported by over 150 member organizations, including governments, civil societies, and tech platforms, the Call sets out objectives such as creating a crisis response model and better understanding the process of radicalization.

New Zealand Prime Minister Jacinda Ardern believes that it is crucial to understand the role of content curation in driving radicalization. She highlights the case of the terrorist involved in the Christchurch attack, who acknowledged being radicalized by YouTube. Ardern calls for an improved understanding of how curated content can influence behavior online.

Ardern advocates for a multi-stakeholder solution to address the presence of extremist content online. She emphasizes the need for collaboration between governments, civil society, and tech platforms, recognizing that it requires a collective effort to effectively eliminate such content. The Call focuses not only on existing forms of online terror tools but also aims to adapt to future forms used by extremists. It proposes measures such as implementing a strong crisis response model and working towards a deeper understanding of radicalization pathways.

Privacy-enhancing tools play a crucial role in preventing radicalization. These tools enable researchers to access necessary data to understand the pathways towards radicalization. By studying successful off-ramps, these tools can contribute to preventing further instances of online radicalization.

One of the challenges in understanding the role of algorithms in radicalization is the issue of privacy and intellectual property. It is difficult to obtain insight into how algorithms may drive certain behaviors due to privacy concerns and proprietary rights. Despite these challenges, gaining a deeper understanding of how algorithms contribute to radicalization is essential.

Artificial intelligence (AI) presents both opportunities and risks in addressing online extremism. AI can assist in areas where there have been previous struggles, such as content moderation on social media. However, caution exists among the public due to potential harm and risks associated with AI. Ardern argues that guardrails need to be established before AI can cause harm, and the development of these guardrails should involve multiple stakeholders, including companies, governments, and civil society.

The involvement of civil society is crucial in discussions around AI in law enforcement to protect privacy and human rights. Ardern believes that civil society, alongside the government, can act as a pressure point in addressing questions regarding privacy and human rights in the context of AI deployment.

Education plays a vital role in addressing online extremism. Teaching critical thinking skills to children is essential to equip them with the ability to think critically and evaluate information. Adapting to rapid technological changes is also necessary, as the accessibility of information has significantly evolved from previous generations, leading to challenges such as disinformation and the need for digital literacy.

The inclusion of civil society and continuous improvement are important aspects of addressing challenges. The creation of a network that includes civil society may face practical obstacles, but ongoing efforts are being made to involve civil society in initiatives such as the Christchurch Call. Ardern acknowledges that learning and improvement are continuous processes, emphasizing the importance of making engagement meaningful and easy.

Overcoming the debate around privacy and safety on social media is a critical step in addressing extremist content online. Efforts to access previously private information through tools created by the Christchurch Call Initiative are underway, allowing researchers to study this information in real-time. The findings of the research will inform further action, involving social media companies in addressing the identified issues.

Disinformation is a significant challenge, and Ardern highlights factors that make individuals susceptible to it, such as distrust in institutions, disenfranchisement, lower socioeconomic status, and lesser education. Preventing individuals from falling for false information is crucial, and rebuilding trust in institutions is necessary to address the impact of disinformation.

Supporting regulators focusing on technological developments is crucial in managing the challenges presented by technological advancements. Ardern acknowledges the poly-crisis resulting from these developments and emphasizes the need to support regulatory efforts.

Ardern expresses optimism in the ability of humans to adapt and design solutions for crises. She has witnessed humans successfully designing solutions and rapidly adapting to protect humanity, giving hope for addressing the challenges posed by technological developments.

Information integrity issues, such as the lack of a shared reality around climate change, impact serious problems. Ardern emphasizes the need to address these issues to effectively tackle challenges like climate change.

In conclusion, the detailed analysis highlights the importance of the Christchurch Call to Action in addressing extremist content online. The Call emphasizes the need for a multi-stakeholder approach involving governments, civil society, and tech platforms. Privacy-enhancing tools and understanding the role of algorithms are crucial in preventing radicalization. Guardrails need to be established for AI before it can cause harm, with civil society involvement to protect privacy and human rights. Education plays a vital role in teaching critical thinking skills and adapting to technological changes. The involvement of civil society, continuous improvement, and overcoming the debate around privacy and safety on social media are essential steps in addressing extremist content. The management of disinformation, support for regulators, and human adaptability in designing solutions for crises are also key considerations.

Maria Ressa

The analysis of the given information reveals several important points made by the speakers. Firstly, it highlights the significant online harassment faced by women journalists, which hampers their ability to participate in public discourse. It is reported that women journalists covering misogynistic leaders often face considerable online harassment and are frequently told to ‘buckle up’ by their editors. This indicates a systemic problem that needs to be addressed.

The role of technology in facilitating hate speech and the dissemination of harmful content is also underscored. The Christchurch terrorist attack, for instance, was live-streamed, demonstrating the misuse of technology for spreading violent and harmful content. This highlights the need to address the role of technology in inciting hate and enabling the circulation of such harmful material.

Efforts to address these challenges require more than just asking news organisations to remove harmful content. The analysis suggests that a multi-stakeholder effort is necessary. Following the Christchurch attack, Jacinda Ardern led a successful multi-stakeholder initiative known as the Christchurch Initiative, which aimed to eliminate extremist content online. This approach emphasises the need for collaboration and coordination among various stakeholders to effectively combat online attacks and extremist content.

The analysis also highlights the importance of strong government action in addressing this issue. The New Zealand government, for instance, took robust measures to eliminate the influence of the Christchurch attacker by removing his name and the footage of the attack from the media. However, it is crucial that government action remains inclusive and does not suppress free speech.

Furthermore, the analysis points out that valuable lessons can be learned from the Christchurch approach in combating radicalisation. The approach was developed in response to a horrific domestic terror attack that was live-streamed on Facebook. It aims to understand how people become radicalised, with a focus on the role of curated content and algorithmic outcomes online.

The impact of social media behaviour modification systems and the current focus on content moderation is a source of concern. Data from the Philippines has been analysed, indicating that lies spread faster on social media than factual information. The analysis argues that current solutions, which mainly focus on content moderation, are not effective in addressing the problem. Instead, a shift towards addressing structural issues, such as platform design, is recommended.

Furthermore, the potential harms of generative AI should be prevented rather than merely reacted to. Concerns over the impact of generative AI are mentioned, and the need for proactive measures to address the harm caused by AI is emphasised.

Civil society collaboration and the corruption of the information ecosystem are seen as crucial problems. The analysis suggests that civil society needs to come together more to address these challenges effectively.

The weaknesses of institutions in the global south, as well as countries experiencing regression of democracy, contribute to the challenges. Authoritarian leaders are leveraging technology to retain and gain more power, which further exacerbates the issue.

Interestingly, the analysis highlights that even intelligent individuals can fall victim to misinformation and behaviour modification in information warfare or operations. This emphasises the need for education and awareness to combat these challenges effectively.

The integration of privacy and trust into tech design is seen as possible; however, it often lacks regulation and pressure from civil society.

Lastly, the analysis suggests that we are in a pivotal moment for internet governance. Maria Ressa, one of the speakers, expresses a more pessimistic viewpoint on the situation, while others remain optimistic. The importance of effective internet governance is underscored, as it directly impacts various areas, including peace, justice, and strong institutions.

In conclusion, the analysis highlights the challenges faced by women journalists in public discourse, the negative impact of technology in facilitating hate speech and harmful content, the need for multi-stakeholder approaches, the importance of strong government action, and the lessons from the Christchurch approach. It also emphasises the concerns regarding social media behaviour modification systems and the current focus on content moderation. Structural issues in platform design, prevention of harm from generative AI, civil society collaboration, corruption of the information ecosystem, weaknesses of institutions, susceptibility to misinformation, and the incorporation of privacy and trust into tech design are other noteworthy points raised. Overall, the analysis underscores the significance of effective internet governance in addressing these complex issues.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Jacinda

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Karoline

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Maria

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

(Re)-Building Trust Online: A Call to Action | IGF 2023 Launch / Award Event #144

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report


Audience

The analysis explored various topics related to the global information ecosystem and its challenges. One key concern highlighted was the negative impact of disinformation, which extends beyond a Western-centric approach. The speakers emphasized the need to consider the effects of disinformation in different languages, as it can affect people’s offline lives. It was recognized that addressing disinformation globally is crucial, rather than focusing on specific regions.

The work of Wikimedia and Global Voices in creating a trustworthy global information ecosystem was appreciated. These organizations were praised for their contributions, involving individuals from different parts of the world. Collaboration and a multi-stakeholder approach were deemed essential in building a reliable information ecosystem.

A speaker, Nick Beniquista, argued for major system-level interventions to address the challenges faced by the information ecosystem. Initiatives such as Pluralis in Europe, trust initiatives for quality online information, and policy interventions like bargaining codes were mentioned. This indicates the need for a comprehensive approach and the involvement of various stakeholders to tackle the complex issues within the information ecosystem.

However, some concerns were raised about the proposed principles discussed during the analysis. These principles were deemed somewhat understated in dealing with the complexity of the challenges. Although they may be widely accepted, there are doubts about their sufficiency in addressing the depth and breadth of the issues. Therefore, comprehensive strategies and solutions are needed.

Furthermore, questions were raised about the effectiveness of a participatory, citizen-driven approach in addressing the systemic challenges of the information ecosystem. One speaker described this approach as “quaint,” suggesting doubts about its effectiveness given the scale of the challenges. This highlights the need to consider alternative strategies alongside participatory approaches.

Regulation and the differentiation between large and small online platforms were emphasized as crucial factors in addressing the challenges of the information ecosystem. It was argued that large platforms bear a special responsibility for content management and accessibility. Efforts by the Danish government and the European Union (EU) were highlighted, including partnerships with organizations like Access Now and the development of regulations that consider different local contexts outside the EU. This underscores the importance of globally applicable regulatory frameworks that also respect regional variations.

The analysis also mentioned concerns about the operationalization of the discussed principles and the potential consequences of the proposed internet safety bill in Sri Lanka. The bill, which has passed its first reading in parliament, raised concerns about censorship and the potential fragmentation of the internet. An audience member expressed opposition to the bill and sought help in collective action, emphasizing the need for collaboration and partnerships in addressing internet governance and legislation.

In summary, the analysis delved into various aspects of the global information ecosystem and its challenges. It highlighted the negative impacts of disinformation, the significance of a trustworthy information ecosystem, the need for major system-level interventions, as well as concerns about certain approaches and proposed bills. Collaborative efforts and collective action are crucial in establishing a reliable and inclusive global information ecosystem.

Moderator

The session focused on the work of a task force dedicated to promoting trustworthy information online, as well as the launch of a set of principles by this task force. The task force is a newly established multi-stakeholder entity within the Freedom Online Coalition. Its main goal is to offer policy recommendations to government institutions and lawmakers to ensure a healthy and reliable online information ecosystem.

The United States is actively promoting trustworthy information online and is committed to addressing the global issue of disinformation. They are implementing initiatives such as fact-checking and media literacy programs to combat the spread of false information. Efforts are also being made to protect and promote open and resilient information ecosystems and support the long-term sustainability of independent media outlets.

While promoting trustworthy information online, the US government emphasizes the importance of not undermining fundamental democratic freedoms. They caution against using regulatory measures to suppress peaceful dissent and silence independent media, civil society activists, human rights defenders, and marginalized groups.

The session also highlighted the importance of platforms like the Freedom Online Coalition and the International Governance Forum (IGF) in countering disinformation and addressing global threats. These platforms are crucial spaces for bringing together stakeholders to tackle the challenges posed by the spread of misinformation and to ensure a secure and open internet.

One significant issue discussed during the session was the consolidation of power over online speech, which negatively impacts platforms advocating for freedom of expression. The session also addressed the exclusion of participation, which can lead to the spread of misinformation. It was noted that depriving half the world’s population of involvement in knowledge spaces contributes to the spread of false information, particularly in the age of generative artificial intelligence.

The session stressed the importance of diversity in media and information, acknowledging that news framing bias is a pervasive problem, and that news organizations alone are insufficient for meeting the need for diverse and reliable information. It was also emphasized that building reliable information structures requires the involvement of civil society and the private sector through partnerships.

Governments were encouraged to play an active role in regulating the online space to promote engagement, free debates, and protect human rights. Striking a balance between regulation and trustworthiness is crucial in ensuring the effectiveness and fairness of online platforms.

The session also addressed the need for educating policy-makers and governments about platforms like Wikipedia and how they operate. This knowledge is important for understanding the value and significance of protecting and promoting such platforms.

The launch of the task force and its principles were seen as an opportunity to pave a strategic path forward and to coordinate with other international initiatives. Participants expressed the need for dialogue and engagement with stakeholders, as well as with counterparts in the ecosystem, to ensure well-informed policies and effective regulations.

The session ended with participants being encouraged to learn more about the task force and get involved. The importance of their role in contributing to the development and implementation of strategies to address the challenges related to trustworthy information online was highlighted.

In conclusion, the session covered various aspects related to the task force’s work on promoting trustworthy information online. It underlined the importance of balancing regulation and trustworthiness, the need for diversity in media and information, and the significance of multi-stakeholder engagement to address global threats and challenges. The session also highlighted the ongoing efforts by the United States and other countries to counter disinformation and promote reliable information online. Overall, the discussion emphasized the key role of collaboration between different stakeholders in building a more trustworthy and inclusive online information ecosystem.

Klara Therese Christensen

This analysis provides a detailed exploration of key points surrounding the role of the internet in relation to marginalized voices, information distortion, and the need for reliable information structures. One argument put forth is that while the internet presents opportunities for marginalized voices to be heard, it also brings about the potential for distortion and muddled reliability of information. This highlights the challenge of navigating and discerning credible information in the digital age.

Partnerships with civil society and the private sector are emphasised as vital in building reliable information structures. By collaborating with these sectors, it is believed that information can be better managed and disseminated. These partnerships can contribute to the development of robust platforms and frameworks that promote the availability and accessibility of accurate information.

Governments are seen as having a responsibility to create human rights-based ecosystems of information. This implies that governments should prioritize the protection of individuals’ rights to access and share reliable information. By ensuring the existence of a conducive environment for the free flow of information, governments can help to counteract the negative effects of misinformation and disinformation.

The analysis also discusses the need for sound regulation in managing online spaces. While it is recognized that regulation is necessary to curb harmful content and maintain order, it is crucial to strike a balance with the preservation of freedom of debate and active engagement. Finding this equilibrium ensures that online spaces remain open and democratic while effectively managing potentially harmful content.

Furthermore, community engagement is considered pivotal in determining and implementing appropriate regulatory measures. By involving and empowering communities, there is a higher likelihood of generating regulations that reflect the needs and perspectives of those affected by them. This participatory approach can foster more effective and inclusive governance of the internet.

The responsibility of large online platforms in content regulation is also highlighted. These platforms are seen as having a unique role in determining what content is published and how it is accessed. Given their influence and reach, the analysis suggests that these platforms should bear a responsibility to uphold ethical standards and prioritize reliable and reputable content.

The analysis touches upon the importance of government funding for the Global South and majority voices. Recognising the existing inequalities, it is argued that governments should allocate resources to support marginalised regions and communities, enabling them to actively participate and have their voices heard.

Noteworthy observations include the excitement surrounding the European Union’s efforts to regulate big tech. The EU is viewed as a potential model for global implementation due to the progress it has made in developing regulations that could serve as a reference for other jurisdictions.

The analysis also emphasises the necessity of collaboration with various organisations to engage in meaningful dialogue and foster improvement. By partnering with diverse stakeholders, there is a greater opportunity to address the challenges associated with information access and dissemination effectively.

In conclusion, this extended analysis highlights the multifaceted issues surrounding the internet’s impact on information reliability and the inclusion of marginalised voices. It underscores the importance of partnerships, government responsibility, sound regulation, community engagement, and the role of large online platforms. Moreover, it reflects the growing recognition that a collaborative and multi-stakeholder approach is essential for building reliable information structures and ensuring the availability and accessibility of trustworthy information online.

Alisson Peters

The United States actively promotes trustworthy information online and combats disinformation on a global scale. They support initiatives to address disinformation and emphasize the importance of digital media and information literacy in enabling individuals to freely express themselves and evaluate information. Additionally, the United States focuses on media resilience by bolstering the resilience of media outlets against legal and regulatory challenges. They support fact-checking and independent media initiatives, aiming to ensure citizens have access to accurate and reliable information.

However, there is concern about the misuse of power by governments to ban certain forms of expression. Governments around the globe claim broad powers to restrict freedom of expression, silencing peaceful dissent. Stakeholder platforms like the Internet Governance Forum (IGF) play a critical role in addressing threats to freedom of expression. These platforms are essential for finding solutions to challenges in the digital world.

The Freedom Online Coalition is a global platform working towards promoting trustworthy online information. It is important to strike a balance between promoting reliable information and upholding democratic principles. The task force’s efforts must not compromise democratic values.

In conclusion, the United States actively promotes trustworthy information online, supports initiatives to combat disinformation, and emphasizes the importance of digital media and information literacy. They also focus on media resilience and support fact-checking and independent media. However, there is concern about the misuse of power by governments to censor expression. Stakeholder platforms like the IGF are critical in addressing threats to freedom of expression. The Freedom Online Coalition promotes trustworthy information while upholding democratic principles.

Ivan Sigal

In the analysis of the given text, several key points are highlighted. Firstly, it is emphasised that online spaces should be open and interoperable, and that user agency is crucial. This means that individuals should have the freedom to access and engage with online platforms and content and have control over their online experiences. The argument is made that the healthy promotion of a wide range of participation is critical in the internet space.

Promoting voice and expression is identified as another important aspect of online spaces. It is suggested that critical thinking about how institutions and media are built is necessary to achieve this goal. Historical facts and friction in the internet context indicate that creating spaces where people can participate more or less equally requires a proactive effort and careful consideration of the diversity of media sources, their funding, and sustenance.

Ivan Sigal, along with organizations like Wikipedia, Global Voices, and Witness, values citizen-generated participatory internet as the core of trustworthy online information. These organizations are seen as starting from an open knowledge perspective and working with communities for whom being online is not easy. However, the break in trust around large social media platforms is identified as a significant challenge.

The potential impact of internet regulations on small and medium-sized non-profit initiatives is a concern. It is argued that regulations being implemented in many global north countries could make it either impossible or expensive for civic-oriented initiatives to create new platforms.

The need for trustworthiness and authenticity in information sharing is emphasized. Global Voices and Wikipedia are highlighted as examples of initiatives that aim to create and share trustworthy information. It is stated that these initiatives are seen as a civic act by many.

Furthermore, the analysis acknowledges the pervasive and complicated bias in news framing. It suggests that news organisations alone are not sufficient to provide all the different kinds of information required in the world. Therefore, alternatives that allow easy entry into an information space and enable the addition of a diversity of voices are needed.

The importance of including a participatory side in regulatory processes is emphasized. It is argued that previous principles have not adequately emphasized this aspect. The analysis suggests that reestablishing the participatory side is crucial to make effective regulations.

The issue of disinformation is also discussed, highlighting its intentional misleading of people and groups. It is noted that disinformation affects many communities in multiple languages. Additionally, the distinction between misinformation and disinformation is highlighted, with the former being seen as ignorance in another language and the latter as deliberate lying.

The analysis also touches upon the need for better information in other languages, particularly for marginalized groups. Initiatives such as Rising Voices, which work with indigenous and marginalized groups to identify languages and support the creation of their own trustworthy information sources, are valued.

The importance of including community voices in conversations is stressed, particularly those from communities that traditionally have less power and resources. The analysis suggests that these communities should not be ignored, and their voices should be included in discussions.

Overall, the analysis advocates for open and interoperable online spaces that prioritize user agency and promote voice and expression. It underscores the importance of proactive efforts to build equitable spaces, address the challenges related to trust on social media platforms, and consider the impact of regulations on non-profit initiatives. It highlights the need for trustworthy information, alternative news sources, and multilingual support. The analysis also underscores the significance of including a participatory side in regulatory processes, distinguishing between misinformation and disinformation, and valuing community voices.

Jan Gerlach

The discussion revolves around the topic of internet regulation and its impact on online spaces. Several key arguments are presented, highlighting the potential negative consequences of centralizing power over online speech and content trustworthiness in the hands of platforms. The Wikimedia Foundation argues that regulation is pushing the decision-making authority on online content to platforms, which raises concerns about the consolidation of power and the potential for biases.

Another argument raised is that excluding people from participating in online knowledge spaces can promote misinformation. It is suggested that when individuals are prevented from engaging in these spaces, the void left behind is often filled with inaccurate and misleading information. The discussion emphasizes the importance of a participatory approach in knowledge spaces as it is seen as essential for promoting peace, security, and combating misinformation.

In contrast to the centralized approach, the conversation encourages regulations that empower communities to make decisions about online content. Jan Gerlach argues for a decentralized approach to internet governance, advocating for regulations that distribute decision-making power among various stakeholders rather than concentrating it solely in the hands of platforms. This approach seeks to ensure a more inclusive and diverse representation in shaping the online environment.

Other noteworthy points include the concerns about laws that make knowledge more expensive, which are viewed as potentially limiting access to information. Furthermore, the discussion highlights the negative impact of regulations that primarily benefit big media houses at the expense of independent journalism and individuals in conflict zones.

The significance of collaboration and sharing best practices is emphasized to safeguard people’s ability to contribute to online spaces and tell their stories. The engagement of governments in conversations about online spaces and freedom of expression is also welcomed, showcasing the importance of multi-stakeholder involvement in shaping internet policies.

The role of Wikipedia is highlighted as an “honest broker” in supporting journalism and promoting information integrity. Moreover, the organization serves to educate policymakers about the mechanisms and functioning of Wikipedia and the potential effects of different regulations on global online spaces. This education aims to increase awareness and ensure more informed decision-making processes.

The establishment of a task force and the associated principles is considered essential for coordinating responses to challenges related to information integrity. This initiative brings together governments, civil society, and proactive private actors to strategize and coordinate processes that promote information integrity in online spaces.

Finally, the conversation encourages individuals to actively engage and join communities like Wikimedia, contributing to their development and understanding how systems like Wikipedia and citizen journalism work. It emphasizes that organizations like Wikimedia exist to support these communities, underscoring the collective responsibility in creating and maintaining diverse and accessible online spaces.

In conclusion, the discussion on internet regulation and online spaces highlights the potential negative consequences of centralization and exclusion. It calls for a participatory approach in knowledge spaces and regulations that empower communities. The conversation also raises concerns about laws that make knowledge more expensive and regulations that benefit big media houses. Collaboration, government engagement, and the role of organizations like Wikimedia are seen as critical components in safeguarding people’s ability to contribute to online spaces, promoting information integrity, and supporting diverse and accessible online environments.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Design Beyond Deception: A Manual for Design Practitioners | IGF 2023 Launch / Award Event #169

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Cristiana Santos

The session focused on discussions around different aspects of e-commerce, deceptive design, dark patterns, and regulation. One of the speakers, Chandni Gupta, conducted research that had a positive influence on regulators, leading to the implementation of easier subscription and unsubscription processes on platforms like Amazon. This highlights the importance of academic research in shaping policies and improving user experience in e-commerce.

Cristiana Santos brought attention to deceptive design practices from a legal standpoint. She discussed how the risk of sanctions can serve as a deterrent for organisations engaging in such practices. Additionally, she emphasised the significance of naming and shaming these practices to create accountability and discourage their use. This legal perspective sheds light on the potential consequences and strategies for tackling deceptive design in the industry.

The session also delved into the prevalence of dark patterns, not only within big tech companies but also in smaller, public organisations. Dark patterns refer to manipulative design tactics that make it difficult for users to refuse or withdraw consent. The negative sentiment surrounding dark patterns was evident, as they were found to have harmful effects on users. Studies have shown that dark patterns can cause cognitive harm, result in the loss of control over personal data, evoke negative emotional responses, and create regret over privacy choices. This highlights the need to address and mitigate the adverse impact of dark patterns on individuals’ well-being.

Furthermore, there was a call for better regulation and a shared vocabulary surrounding dark patterns. Santos suggested that a shared understanding of dark patterns would greatly benefit user studies, decision mapping, and harm assessments. It is essential for regulatory bodies and scholars to align in their understanding of dark patterns to effectively regulate and combat their negative consequences. This emphasises the importance of collaboration and knowledge exchange among key stakeholders to address the challenges posed by dark patterns.

Santos highlighted the influence of research on policy-making, the legal standpoint on deceptive design practices, the prevalence and harmful effects of dark patterns, and the need for better regulation and a shared vocabulary to address these issues effectively. This comprehensive examination provides valuable insights into the complexities surrounding user experience and the imperative for responsible technological practices in the digital landscape.

Titiksha Vashist

Vashist explores the issue of deceptive design also known as dark patterns and their negative impact on users and digital ecosystems. One aspect discussed was the existence of dark patterns in various online experiences, such as e-commerce apps, social media, and fintech services. They are intentionally designed to deceive or manipulate users, ultimately influencing their decision-making. This can lead users to make choices that they would not have made if not for the deceptive design.

Deceptive design can also result in privacy violations, financial losses, psychological harm, and wasted time and resources. These consequences not only affect individuals but also have broader implications for the integrity and functioning of digital ecosystems.

Vashist also highlighted the ‘Design Beyond Deception’ project, which spanned 18 months and involved global expert consultations, workshops, and a research series. The primary goal of this project was to gain a better understanding of how deceptive design impacts contexts that have received less attention in previous research. By shedding light on these understudied areas, the project aims to contribute to the overall understanding of the harmful effects of deceptive design.

Additionally, the US Federal Trade Commission and the European Commission have been actively investigating deceptive practices in their respective jurisdictions. Deceptive design distorts fair competition and leads to unfair trade practices. Therefore, it is crucial to address deceptive design in order to safeguard the integrity and well-being of users and digital systems.

Caroline Sinders

Dark patterns create an unequal web, where users with a design background or knowledge of user experience (UX) design are more equipped to recognise and avoid them. This knowledge gap creates a disparity between users who can navigate the web safely and those who lack this understanding.

Addressing and investigating these harmful design patterns requires a comprehensive understanding of the expected design patterns and where deception or manipulation occurs. This highlights the importance of interdisciplinary research, bringing together policymakers, regulators, and designers. The collaboration of these different areas of expertise can lead to more effective strategies to combat and mitigate the negative effects of these design patterns.

Caroline Sinders, a passionate advocate, emphasised the need for extensive research that encompasses technical, design, and policy perspectives. Understanding the entire process of product development, including manufacturing and testing, is essential for thorough analysis of the interface. This comprehensive approach strengthens the ability to identify and address deceptive design patterns, ensuring a more user-friendly and trustworthy digital landscape. Policymakers, regulators, and designers must work together to develop effective strategies and solutions. Extensive research, incorporating technical, design, and policy perspectives, is necessary to understand and combat deceptive design patterns, ultimately creating a more secure and user-centric digital environment.

Maitreya Shah

Deceptive design practices, particularly in accessibility overlay tools, have detrimental effects on individuals with disabilities. These tools make superficial changes to the user interface, giving the illusion of accessibility without addressing the source code. Consequently, people with disabilities are deceived into perceiving websites as accessible, when in reality, they still encounter barriers. This not only undermines their ability to navigate and interact with online content but also hinders their equal participation in society.

One concerning aspect is that accessibility overlays can obstruct assistive technologies, which are essential for individuals with disabilities to access and interact with digital content. By impeding these technologies, accessibility overlays violate the privacy and independence of people with disabilities, making it challenging for them to fully engage online.

Furthermore, companies that use accessibility overlay tools are potentially disregarding their moral and legal obligation to create genuinely accessible websites. By relying on these tools, they sidestep the necessary steps to ensure that their digital content is inclusive, effectively excluding individuals with disabilities from participating in online activities.

A related issue is the possibility of users with disabilities being coerced into making unwanted purchases as a result of these deceptive design practices. When accessibility overlays create a false sense of accessibility, users may unknowingly engage in transactions that are not aligned with their preferences or needs. This highlights the harmful consequences of deceptive designs and the ethical responsibilities that businesses should uphold.

Deceptive designs are not limited to accessibility overlay tools but also extend to AI technologies, such as chatbots and large language models. These technologies are designed to exhibit human-like characteristics while interacting with users. However, this blurring of boundaries between humans and machines can be unsafe and misleading.

An alarming case involved a person who was influenced by a chatbot to attempt to assassinate the late Queen Elizabeth. Although this is an extreme example, it demonstrates the potential dangers associated with deceptive designs in AI technologies. Additionally, the data mining practices utilised in AI can violate users’ privacy rights, further exacerbating the concerns surrounding these technologies.

Given the prevalence of deceptive designs in AI and emerging technology, there is a pressing need for regulations to address these practices. Regulators worldwide are increasingly recognising the importance of mitigating the harmful effects of deceptive design and promoting transparency and accountability in the development and implementation of AI technologies. This regulatory intervention aims to shape discussions surrounding emerging technology and ensure that ethical considerations are taken into account.

In conclusion, deceptive design practices, whether in accessibility overlay tools or AI technologies, present significant challenges and risks. They harm individuals with disabilities, diminish their access to online platforms, and violate their privacy rights. It is imperative for companies to refrain from using accessibility overlay tools that deceive users and hinder full accessibility. Additionally, the regulation of AI and emerging technology is crucial to address deceptive design practices and ensure a safe, inclusive, and transparent digital environment for all.

Chandni Gupta

The research conducted on dark patterns has revealed a concerning trend of deceptive designs being used by businesses across various sectors on websites and apps. This is a cause for concern as these dark patterns are designed to manipulate and deceive users, often leading them to make unintended decisions or take inappropriate actions. Chandni’s research has shown that many dark patterns that exist today aren’t necessarily illegal, which raises questions about the ethics behind their use.

Furthermore, data from Australia highlights the negative consequences experienced by consumers as a result of encountering dark patterns. Research revealed that 83% of Australians have experienced one or more negative consequences due to dark patterns. These consequences include compromised emotional well-being, financial loss, and a loss of control over personal information. The impact of dark patterns on consumers’ lives and their trust in businesses can’t be underestimated.

One argument that emerges from the research is that businesses need to take responsibility for their actions and change their behaviour towards dark patterns. The prevalence of these manipulative designs can harm consumer trust and loyalty in the long run. It is disheartening that businesses aren’t being held accountable for these practices, leading to a sense of frustration among consumers. However, some businesses have the ability to make changes today and set an example for others to follow.

Additionally, it is recognised that everyone in the digital ecosystem has a role to play in combating dark patterns. Governments, regulators, businesses, and UX designers all have a responsibility to address this issue. By working together, it is possible to create a fair, safe, and inclusive digital economy for consumers. UX designers, in particular, can share research resources with their colleagues to demonstrate the impact that better online patterns can actually have.

In conclusion, the research on dark patterns highlights the concerning prevalence of deceptive designs on websites and apps. Consumers in Australia have reported significant harm resulting from encountering dark patterns. It is crucial for businesses to take responsibility for their actions and change their behaviour towards these manipulative practices. Additionally, a collective effort from all stakeholders in the digital ecosystem is needed to combat dark patterns and create a more trustworthy and inclusive online environment for consumers.

Speakers

&

’Caroline

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Chandni

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Cristiana

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Maitreya

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Titiksha

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Bridging Connectivity Gaps and Harnessing e-Resilience | IGF 2023 Networking Session #104

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Audience

The session explored the challenges and potential solutions for fibre connectivity in remote areas. One of the main challenges identified is the distance between villages, which presents a significant hurdle for fibre connectivity without the use of repeaters. However, the analysis points out that fibre connectivity has evolved over time, offering solutions such as low earth satellites or microwave links to connect remote areas. These alternatives may be cost-effective in the short term, but it is acknowledged that fibre connectivity provides a much greater transmission capacity compared to satellites and microwaves.

The audience noted that fibre connectivity can provide up to ten times more transmission capacity than satellites or microwaves. Additionally, the size of a cable, which can be as small as a finger, can accommodate up to 48 fibre cores. While satellites have a lifespan of five to seven years, fibre connectivity offers a more durable and long-lasting option.

It is suggested that cost-effective options like satellites and microwaves may be initially considered for remote areas, with fibre connectivity being implemented as economies develop. The cost of fibre connectivity is estimated to be £6,000 per kilometre, while satellites offer a transmission capacity of one giga BPS per beam and fixed microwaves have a transmission capacity of one giga BPS.

The session raised important questions about the extent to which fibre connectivity can cover underserved areas in Nepal and the projected timeline for implementation. Furthermore, there is interest in comparing the current solution to TV white space technology, which indicates a desire to understand the advantages and disadvantages of each system.

In addition to infrastructure and technology concerns, the analysis delves into the composition of the Local User Gateway System (LUGs) device, particularly inquiring about the integration of open software and hardware. Furthermore, there is an interest in the possibilities of customisation for local communities to cater to their specific needs. This highlights the importance of ensuring that connectivity solutions are adaptable and tailored to the unique requirements of different communities.

In terms of sustainability, the analysis addresses concerns about the supply chain in the event of breakdowns and device replacements. It also raises potential issues with e-waste, showing concern for responsible consumption and production.

Overall, the session prompts important considerations and questions related to coverage, timeline, technology comparisons, customisation, and sustainability, contributing to a comprehensive understanding of remote connectivity technologies.

Toshikazu Sakano

Toshikazu Sakano, a researcher at the Advanced Telecommunications Research Institute International in Kyoto, Japan, is devoted to researching and developing ICT for disaster countermeasures. His passion for this area of study was ignited after the devastating earthquake that struck Japan in 2011.

Sakano recognises the significance of communication locality, which refers to people’s tendency to communicate more with those physically close to them. By incorporating this understanding, Sakano aims to enhance communication systems in disaster-affected areas, enabling affected individuals to stay connected and informed.

Sadly, statistics reveal that the Asia-Pacific region has experienced a high number of disasters in 2021. This highlights the urgent need for effective disaster management strategies and innovative approaches to minimise the impact of such catastrophes. However, during disasters, conventional communication networks, including base stations and communication buildings, often suffer severe disruptions. As a result, access to internet and phone services is severely limited, leading to a significant gap between the demand and supply of crucial communication services.

Sakano’s research acknowledges this challenge and seeks to address it. By implementing robust ICT solutions that can withstand the impact of disasters, he aims to bridge the communication gap and ensure that affected communities receive the necessary communication services.

In addition to his research, Sakano has recently established a startup company called Negro Networks. The main objective of this venture is to commercialise the LUGS project. The project offers a portable device that enables individuals to access social networking services through wifi even in emergency situations.
It is noteworthy that LUGS extends beyond disaster response applications. It can also bridge the internet accessibility gaps experienced by approximately one-third of the global population. In areas with limited broadband connectivity, LUGS can be used to provide internet access, thereby reducing the digital divide and contributing to SDG 9 (industry, innovation, and infrastructure) and SDG 10 (reduced inequalities). This represents a remarkable opportunity to leverage technology and innovation to address disparities and promote global inclusivity.
Furthermore, a feasibility study conducted by Sakano and his team demonstrated the versatility of LUGS. They installed e-learning management software into the devices, showcasing their potential for edge computing. This flexibility and adaptability allow LUGS to be tailored to various contexts, making it a valuable tool for a wide range of uses and empowering local communities to make effective use of its functions.
LUGS, with its ability to restore local communication during disasters, bridge internet accessibility gaps, and offer versatile functionality, has the potential to significantly impact disaster response, global connectivity, and local community empowerment.

Dr. Haruo Okamura

Dr. Haruo Okamura proposes a solution for connecting unconnected rural areas in a phased manner using Rural Area Connectivity (RACs) and optical fibre cables called BIRD. The approach begins with the implementation of independent RACs intranet in villages, which are then interconnected using BIRD cables. BIRD cables, which can be easily laid on the ground surface, are submarine cables known for their high robustness.

The success of this connectivity solution has been demonstrated through its implementation in an unexplored jungle in a Nepal mountain village in 2019. The optical fibre cable was laid by local residents using their own hands, showcasing the potential of this approach.

Fibre connectivity, such as that offered by BIRD cables, offers several advantages over wireless technologies. It has been found that a single fibre can provide more than ten times the capacity of wireless options. BIRD cables consist of up to 48 fibre cores enclosed in a stainless welded tube, making them suitable for various terrains. With state-of-the-art technologies, fibre connectivity can operate without repeaters for distances exceeding 500 km. Furthermore, BIRD cables achieve cost reductions of up to 90% due to their simple construction on the ground surface.

The successful implementation and innovation of BIRD cables in rural connectivity have gained recognition, as evidenced by the World Summit for Information Society (WSIS) championship awarded to the project. The National Telecom Authority of Nepal has also granted permission to use BIRD technology in the regions of Mount Everest and Mount Annapurna.

While TV white space spectrum can cover large areas, it is important to note that it does not match the capacity provided by fibre cables. Fibre cables, like BIRD, offer significantly higher capacity compared to TV white space spectrum. This highlights the importance of optical fibre cables in connecting rural areas effectively.

In summary, Dr. Haruo Okamura proposes utilising RACs and BIRD cables to connect unconnected rural areas. The recognition and permits granted for BIRD technology further validate its effectiveness in rural connectivity.

Chandraprakash Sharma

The Indian government is putting substantial effort into digitalising governance and infrastructure. They have plans to conduct trials not only in India but also in other developing nations. This effort is particularly important because currently, 50% of the population in India does not have access to the internet. By digitalising governance and infrastructure, the government aims to bridge this digital divide and ensure that all citizens have access to crucial services and information.

The adoption of LUX for digital infrastructure in developing nations is also supported. The LUX project highlights the significance of access to information, especially in the aftermath of disasters. By implementing LUX, countries can have a more resilient and reliable digital infrastructure that can provide vital information during and after catastrophes. This emphasises the role of technology in building sustainable cities and communities, as outlined in SDG 11.

Another area of focus is the potential of local AI services. These services have various applications, particularly in e-education and public distribution systems. By utilising local AI services, data can be processed faster, security can be enhanced, and there can be a reduction in bandwidth consumption and energy usage. This has implications for SDG 4, which aims to ensure quality education for all, and SDG 9, which focuses on industry, innovation, and infrastructure.

Furthermore, training local individuals for device maintenance is seen as beneficial in terms of ensuring the smooth operation of digital infrastructure. A case study in the Philippines demonstrated the effectiveness of training local people to address any issues that may arise with the devices. This approach promotes local capacity building and empowers communities to take ownership of their digital infrastructure.

In terms of hardware, the availability of components for sustainable production is worth noting. LUX, a project built using off-the-shelf components, highlights the accessibility of these components in various locations, not just specific to Japan. This promotes responsible consumption and production, as stated under SDG 12.

Additionally, there is the possibility of incorporating open hardware, such as Raspberry Pi, into future products. Chandraprakash Sharma hints at this potential, highlighting the advantages of open hardware for their products. Open hardware can foster innovation and collaboration, encouraging the development of new technologies and solutions.

By addressing issues such as internet access, device maintenance training, and utilising local AI services, these countries can harness the power of technology for the betterment of society. The availability of hardware components and the potential of incorporating open hardware further contribute to sustainable production and innovation.

Glyndell Monterde

LUX, an innovative communication system, has been successfully implemented and fully tested in the Philippines. It offers a range of features, including voice calls, messaging, and bulletin systems, seamlessly integrated into local use cases, such as learning management systems. The successful implementation of LUX was demonstrated through the testing of its performance and functionality, including its ability to operate in remote areas thanks to its methodology that incorporates both local and cloud storage. All data on the local LUX system can be synced to the cloud when internet connectivity becomes available, ensuring continuous access to communication services. This feature makes LUX a reliable and effective solution for areas with limited connectivity.

Furthermore, LUX has significant potential impacts on the community, particularly in the area of disaster management. During times of disaster, access to critical information is vital for making informed decisions. LUX improves this access by providing a reliable communication channel, facilitating efficient and effective decision-making processes. Additionally, LUX enhances coordination among different stakeholders involved in disaster response, enabling faster and more coordinated efforts.

LUX also plays a key role in promoting community engagement in disaster management. By providing a platform for communication, it encourages more inclusive and community-driven approaches to disaster response. This ensures that local communities have a voice in the decision-making process and strengthens their resilience and ability to seek aid and communicate during these events, reducing feelings of isolation.

By utilising LUX, individuals and organisations can develop essential skills in disaster management, response, and communication. This helps enhance overall resilience and the ability to effectively respond to and recover from future disasters.

In conclusion, the successful implementation of LUX in the Philippines showcases its capabilities as an innovative communication system. Overall, LUX enables better communication and resilience in communities, making it an invaluable tool for addressing challenges.

Jeffery Llanto

Several projects have been discussed in the Philippines to address the issue of internet connectivity and infrastructure. One of these projects is the CBISnet Foundation, which operates under the Department of Science and Technology. Their main objective is to implement a locally accessible cloud system on Hilutungan Island, aiming to bridge the gap in internet access. The project timeline is set from 2019 to 2023.

To ensure the success of these projects, the involvement of various stakeholders, such as ATR and APNIC, is essential. Continuous training is also provided to various stakeholders, including schools, local communities, fishermen, housewives, and students. One notable achievement is the training of teachers to troubleshoot and install the system, enabling them to support the implementation process.

A key emphasis of these projects is the importance of grassroots penetration and user adaptability. The aim is to introduce technology in a simplistic manner to island communities, working at a grassroots level. Infrastructure is installed, and teachers and students are trained to ensure system accessibility. Furthermore, the projects are being introduced during non-disaster times, enabling their application for normal scenarios and experiences.

These projects have demonstrated their adaptive potential during crises. For example, during the COVID-19 pandemic, new use cases, such as a learning management system, were introduced. This highlights the flexibility and versatility of the cloud-based learning system in addressing unexpected challenges. Additionally, during disasters in 2022, the cloud system was utilised as a charging station, facilitating device charging and supporting communities in times of need.

LUX, which initially started with file repositories and calls, evolved into different modules based on real scenarios in the community. It proved to be an effective charging station for devices on islands during emergencies. This adaptability and evolution of LUX exemplify the project’s dedication to meeting the evolving needs of the community.

Recognising the need for low-cost solutions to connectivity challenges, there have been suggestions to explore low-cost fibre optics.

Overall, these projects, including LUX and the new Frontline Operations System, aim to advance and adapt to meet the needs of the community. The continuous evolution of LUX and the introduction of the Frontline Operations System reflect the commitment to innovation and ensuring that the projects remain relevant and effective.

In conclusion, these projects in the Philippines highlight the efforts to improve internet connectivity and infrastructure. Through collaboration with stakeholders, an emphasis on grassroots penetration, and an adaptive approach, these projects aim to bridge the gap in internet access and meet the evolving needs of the community. The pursuit of low-cost solutions and the commitment to continuous advancement demonstrate a dedication to achieving sustainable connectivity in the country.

Moderator

The session also delves into several discussions revolving around internet access, connectivity, and the digital divide. It highlights the persistent issue of a large proportion of the global population, particularly in less developed countries, lacking access to the internet. Supporting this finding, 64% of the population in less developed countries currently do not have internet access. This statistic emphasises the significant gap that exists in terms of digital connectivity across the world.

Several concepts have been proposed to overcome the challenges associated with disaster-affected areas. Mobile DRT for Restoration of Unserviceable Communications (MDRU) and Local Ultrawideband Geosynchronous System (LUGS) are mentioned as potential solutions for restoring communication services. MDRU involves bringing resources for restoring communication services to disaster-affected areas, while LUGS focuses on restoring internet services like social networking through the use of portable devices.

The push for digitalisation of governance and infrastructure, especially in India, is highlighted as a means to address the digital divide. The lax network technology emerges as a potential solution, particularly in disaster-hit regions, e-education, and the distribution of government aid information.

AI technology, when applied at a local or edge level, is seen as highly beneficial to underserved populations in various sectors. AI offers faster data processing, enhanced security while consuming less bandwidth, and can provide insights for farmers, healthcare workers, safety workers, emergency responders, and educational sectors. The potential of AI, combined with the energy-efficient nature of AI systems, such as being capable of charging through solar panels, further underscores its benefits.

In conclusion, the session sheds light on the pressing issue of internet access, connectivity, and the digital divide. It underscores the importance of connectivity in various aspects of life, particularly during crises like the COVID-19 pandemic and in disaster situations. The proposed concepts, such as MDRU, LUGS, and LUX, offer potential solutions to address connectivity challenges. Additionally, the potential of digitalisation, AI technology, and collaboration highlight the avenues available to bridge the digital divide and ensure equitable access to the internet and its benefits.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Chandraprakash

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Dr.

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Glyndell

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Jeffery

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Toshikazu

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Meeting Spot for CSIRT Practitioners: Share Your Experiences | IGF 2023 Networking Session #44

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Audience

In the analysis, the speakers emphasised the importance of building bridges between different communities to contribute to an open, free, stable, and secure internet. They highlighted the need for increased interaction and adoption of each other’s languages and processes between network operators and cybersecurity specialists. This closer collaboration would facilitate a more effective response to incidents and enhance overall information sharing in the field of cybersecurity.

The speakers also stressed the significance of finding a balance between security and stable communication. They acknowledged that while security is essential for protecting networks and data, it should not hinder the smooth flow of communication. Striking this balance ensures that individuals and organisations can communicate freely while maintaining a safe online environment.

Cooperation at both the national and global level was identified as highly beneficial for internet security. The analysis indicated that different regions have various experiences that can be shared for mutual benefit. Adopting a “defend locally, share globally” approach contributes to wider global security and promotes cooperation in tackling cybersecurity challenges.

Furthermore, the speakers discussed how geopolitical issues can both challenge and strengthen the cooperation of Computer Emergency Response Teams (CERTs). While geopolitical tensions can potentially hinder cooperation, recent events have highlighted how the commitment to keeping the internet secure has strengthened certain relationships despite these challenges.

The analysis also highlighted the crucial role of sharing information in tracing the origins of cyberattacks. However, it was noted that this can be difficult due to factors such as local laws and regulations and the intersection between cybersecurity and national security. Despite these challenges, the speakers emphasised the importance of sharing information to effectively combat cyber threats.

Resource limitations were identified as a constraint to international cooperation. The analysis suggested that having expert-level communication specialists is necessary for continuous monitoring and maximising resource findings. Addressing resource constraints would facilitate more effective international cooperation in the field of cybersecurity.

In times of global crises, such as the current pandemic, the speakers emphasised the need to continue information sharing. They viewed the pandemic as a blueprint for global information exchange during crisis situations. Even amid geopolitical tensions, the speakers concluded that the continuation of information exchange is vital to effectively address cybersecurity challenges.

Overall, this comprehensive analysis underscored the importance of building bridges between different communities, striking a balance between security and stable communication, and promoting cooperation at both national and global levels. It also highlighted the challenges and opportunities presented by geopolitical issues, the significance of sharing information, the constraints of resource limitations, and the importance of continuing information sharing during global crises.

Bernhards Blumbergs

A recent meeting addressed the importance of freedom, openness, and security on the internet. While acknowledging that achieving all three aspects simultaneously may not always be possible, participants stressed the need for ongoing efforts to strive for them. The argument put forth was that the internet should be a space that promotes freedom of expression, ensures open access to information, and prioritizes user security and privacy.

Regarding information sharing, participants highlighted its crucial role in the development and progress of the internet. Even during times of geopolitical tension, it was emphasized that continued information sharing is vital. Peter Koch from the German top-level domain registry specifically emphasized the significance of maintaining information exchange despite any underlying political conflicts. Additionally, the meeting discussed how the COVID-19 pandemic served as a blueprint for prioritizing global information exchange during a crisis, showcasing that challenges can be overcome to facilitate the flow of information.

The meeting also underscored the need to understand and prioritize device and personal security. Participants agreed that enhancing cybersecurity requires individuals to have a deeper understanding of device security and personal security practices. Furthermore, they recognized the essential nature of practicing good cyber hygiene at both personal and national levels to create a safer internet environment.

Importantly, it was emphasized that information sharing should not be restricted to specific layers within the internet infrastructure. Participants argued that sharing information should extend beyond technical, operational, and strategic layers and instead be facilitated between these layers. Building understanding and effective communication across different levels of the internet infrastructure were highlighted as crucial aspects of successful information sharing.

In conclusion, the meeting highlighted the importance of striving for freedom, openness, and security on the internet, despite the challenges of achieving all three simultaneously. It also emphasized the critical role of information sharing, particularly during periods of geopolitical tension and crises. Additionally, understanding and prioritizing device and personal security, along with facilitating information sharing across various levels of the internet infrastructure, were identified as key factors in creating a better and more secure internet environment.

Adli Wahid

Adly Wahid, a security specialist at the Asia-Pacific Network Information Centre, is actively engaged with the CERT and C-CERT community in the Asia-Pacific region. This engagement allows him to interact with various stakeholders involved in cybersecurity, fostering collaboration and knowledge sharing.

Previously, Adly Wahid has gained valuable experience working for the National CERT, Malaysia CERT, and a CERT dedicated to the financial institution. These prior positions have equipped him with a strong background in handling cybersecurity incidents and implementing effective security measures.

The importance of cooperation between CERTs and CSIRTs at both national and global levels is paramount, as it ensures a wider exchange of experiences and technologies to effectively combat cyber threats. By collaborating and benefiting from one another’s expertise, CERTs and CSIRTs can enhance their capabilities in dealing with cybersecurity incidents. Despite global problems and adversarial geopolitical issues, cooperation between these entities has actually been strengthened, showcasing their commitment to making the internet a secure and safe place.

Recent geopolitical issues have played a positive role in strengthening the cooperation between CERTs and CSIRTs. The analysis reveals that these geopolitical issues have actually heightened the commitment to collaboration, as stakeholders recognize the shared interest in safeguarding cybersecurity. By uniting, these entities are better equipped to address the evolving challenges in the digital landscape.

Overall, Adly Wahid’s expertise and experience, combined with the increased cooperation between CERTs and CSIRTs, contribute to ongoing efforts to ensure cybersecurity at various levels. This insight highlights the significance of international collaboration and knowledge sharing in effectively tackling cyber threats and promoting a secure digital environment.

Masae Toyama

Masae Toyama, a cybersecurity practitioner, has drawn attention to the pressing need for increased representation of cybersecurity workers in internet governance forums. In these spaces, Toyama noticed a distinct lack of voice for professionals in the field of cybersecurity, and they encountered difficulty in connecting with others who shared similar backgrounds during previous forums. This experience prompted Toyama to recognize the necessity for a dedicated platform where cybersecurity meets internet governance.

Toyama firmly believes that cybersecurity practitioners play a fundamental role in upholding a secure and stable cyberspace. However, despite their significance, their presence and voices are not as prominently heard among the various stakeholders within internet governance forums. Drawing attention to this disparity, Toyama advocates for a stronger representation of cybersecurity experts within these platforms.

Toyama’s positive stance emphasizes the importance of creating a space where the intersection of cybersecurity and internet governance can be realized. By fostering a greater inclusion of cybersecurity professionals within forums like the Internet Governance Forum, the collective knowledge and expertise of the cybersecurity field can be harnessed to effectively address the challenges and concerns of internet governance.

In summary, Masae Toyama highlights the pressing need for a more robust representation of cybersecurity workers in internet governance forums. Their personal experience revealed a lack of voice for cybersecurity professionals, and they emphasize the essential role they play in maintaining a secure cyberspace. Toyama advocates for the creation of a platform where cybersecurity and internet governance intersect, in order to strengthen the presence and voices of cybersecurity practitioners within these influential forums. This perspective offers valuable insights into the ongoing dialogue surrounding the intersection of cybersecurity and internet governance and underscores the significance of including diverse perspectives in shaping the future of the digital landscape.

Moderator

The need for increased representation of cybersecurity practitioners in the Internet Governance Forum (IGF) is emphasised. Currently, there is a lack of individuals with backgrounds in cybersecurity, such as those working at CERT or actively involved in cybersecurity, participating in the IGF. This lack of representation results in their voices not being heard as loudly as other stakeholders.

A proposed session by a speaker is recognised as beneficial for all participants. The session aims to address the need for greater involvement and voice of cybersecurity practitioners in the IGF. It is expected that such sessions will provide a platform for cybersecurity professionals to share their expertise and insights among the various stakeholders involved.

Networking sessions are also implemented to encourage participants to interact and discuss their experiences and views on cybersecurity. These sessions provide an opportunity for attendees to engage with individuals they may not have spoken to before, fostering collaboration and the exchange of ideas.

Building bridges between network operators and cybersecurity specialists is considered crucial for establishing an open, stable, and secure internet. Recognising that these two professions utilise different languages, mindsets, concepts, and processes, there is a need to bridge the gap between them. The initiative taken by organisations like ADLI in strengthening the partnership between these communities is highly regarded.

Several challenges in the field of cybersecurity are identified, such as the obstacles related to information sharing. Cyberattacks are often unpredictable, making it difficult to trace their sources. In addition, local regulations and national security issues can complicate the sharing of information. These challenges need to be resolved in order to build strong collaborations and improve cybersecurity practices globally.

Resource limitations and the need for capacity building also pose significant challenges in the cybersecurity sector. Constant monitoring, particularly through cooperation with international entities, requires specialist skills. Given the link between cybersecurity and national security, enhancing capacity building initiatives becomes imperative.

The importance of information sharing and building trusted networks for message exchange is emphasised. It is not only necessary to share information within specific layers of cybersecurity but also between those layers. By doing so, a deeper understanding can be developed, contributing to a more comprehensive and effective cybersecurity framework.

Cyber hygiene, which entails understanding device security, personal security, and learning about cyberspace, is considered essential for maintaining a secure online environment. The responsibility for practicing cyber hygiene extends to all individuals, not just technical experts. By promoting the importance of cyber hygiene, stronger global communities can be built, further enhancing cybersecurity.

In conclusion, the need for greater representation of cybersecurity practitioners in the IGF is highlighted. Proposed sessions and networking opportunities aim to address this need, facilitating knowledge sharing and collaboration among stakeholders. Challenges related to information sharing, resource limitations, and capacity building are identified, emphasising the necessity for proactive measures. The significance of information sharing, building trusted networks, practicing cyber hygiene, and ensuring widespread understanding of cybersecurity principles are all crucial for creating a secure and stable cyberspace.

Hiroki Mashiko

The analysis highlights key points about Entity Data, a prominent system integration company in Japan. It is noted that Entity Data has an internal Computer Emergency Response Team (CERT), known as Entity Data CERT. This CERT is responsible for handling and responding to cybersecurity incidents within the company.

One notable fact revealed in the analysis is that Hiroki Mashiko, an individual associated with Entity Data, works as a forensic engineer at Entity Data CERT. This indicates that Mashiko is involved in investigating and analysing digital evidence related to cyber incidents within the company. The analysis suggests that Mashiko’s role as a forensic engineer emphasises his technical skills and expertise.

Another point made in the analysis is that Mashiko is described as being more focused on technical aspects rather than governance-related matters. This suggests that his strengths lie primarily in technical areas rather than broader aspects of corporate governance. However, the analysis does not provide further information regarding Mashiko’s specific responsibilities or tasks within his role.

The analysis overall has a neutral sentiment, indicating a lack of strong positive or negative opinions or emotions. While it offers valuable insights into Entity Data, Entity Data CERT, and Hiroki Mashiko, it does not draw any further conclusions or assessments beyond these observations.

To summarise, this expanded summary provides a more detailed overview of the analysis. It highlights Entity Data and its internal CERT, Entity Data CERT, as well as Hiroki Mashiko’s role as a forensic engineer. Furthermore, it emphasises Mashiko’s technical orientation and the neutral sentiment of the analysis.

Speakers

&

’Adli

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Bernhards

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Hiroki

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Masae

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Safeguarding Processing of SOGI Data in Kenya | IGF 2023

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report

Jeremy Ouma

The assessment offers an exhaustive exploration of diverse facets of Kenyan society, legislation, and practice with significant emphasis being placed on LGBT rights and data protection.

A primary cause of concern emerges from the deficient legal protections for LGBT individuals against discrimination grounded in their sexual orientation or gender identity. The current Kenyan legal framework is found lacking in offering ample defence to these marginalised groups, thus fostering an environment in which the revelation of personal demographic data could invite bias and negative repercussions. This scenario is aggravated by particular practices linked to LGBT identities being outlawed in the nation.

However, this situation isn’t entirely devoid of optimism. A discernible societal shift is observed, with increasing momentum in Kenya to repeal or amend penal codes criminalising acts related to diverse gender identity. Despite hindrances to these initiatives, such as refusal of organisation registration, the identification as diverse is not outlawed. Activists highlight an ongoing case between a regulatory body and the ‘NGO board’ as a paradigm in this advocacy.

Prominent worries regarding data protection and processing standards also attract attention in the analysis. The differential handling of sexual orientation and gender identity data under current legal structures is deemed problematic. In order to address these issues, organisations need to register with the Office of the Data Protection Commissioner. They are urged to prepare and update data protection protocols and increase awareness about privacy during data management. An internal capacity building within civil organisations is particularly underscored to foster greater awareness and engagement on data protection.

Furthermore, the analysis points out persisting challenges relating to digital platforms and their content management strategies. These include the potential amplification of harmful content and a lack of understanding of local context in content moderation processes. The scarcity of transparency within these systems further exacerbates the situation, yet progress is recognised through ongoing legal cases, such as the one involving Meta and its former content moderators. This case serves as a tangible pursuit to hold platforms accountable within the Kenyan jurisdiction. Efforts are underway to bridge the gap between local users and platforms, nudging platforms to better comprehend and respond to their user base.

Finally, the study extends its purview beyond Kenya, expressing negative sentiment around homosexuality laws in Uganda. The persistent implementation of these unfair laws, resulting in adverse prosecutions based on them, is recognised as a significant violation of human rights.

In summary, the analysis identifies a complex network of obstacles within Kenyan society, but simultaneously showcases several steps taken to address and surmount these challenges. It provides a detailed account of ongoing efforts and the dire need for progress towards a more inclusive society.

Angela Minayo

Angela Minayo emphatically discusses the significance of well-regulated data management in preventing human rights violations. She emphasises that while data affords immense opportunities, if poorly regulated, it can be manipulated to facilitate human rights abridgements. Therefore, robust data regulation legislation is essential to safeguard human rights.

Minayo affirms the necessity of a harmonised protection framework for sensitive data, encompassing gender and sexual orientation. The continuing debate about data protection, confidentiality, and personal autonomy prompts her to argue for more comprehensive legislation that provides protection not just for conventional data but also for sensitive information regarding an individual’s gender identity and sexual orientation.

Conversely, Minayo voices her reservations concerning the efficacy of Kenya’s existing Data Protection Act. Despite the law’s progressive human rights perspective, she regards it as deficient in its coverage of gender identity under sensitive data and its contradictory approach in handling health data and sexual orientation.

Minayo spotlights non-profit entities and highlights the need for these organisations to comply with data protection regulations. She proposes that while data protection often associates with corporate compliance, both for-profit and non-profit entities need to ensure adherence to the regulations. Significant mishandling of personal data, especially sexual orientation and gender identity data, can result in severe human rights implications.

She goes on to emphasise the complexity of data protection and espouses an increase in the resources geared towards effective data protection, notably for non-profit entities that perhaps lack the necessary resources for comprehensive data security. Minayo further calls upon data entities in various countries to register data controllers and processors to legitimise their roles and allow for efficient allocation of budgets and responsibilities for data protection.

Minayo highly commends the use of data processing templates from Article 19, designed to assist non-profits. She affirms these templates as serving as a checklist for various data protection procedures. She also underscores the importance of organisations soliciting consent for personal data usage and documenting said consent.

In the context of protecting sensitive data, she references the severe implications for marginalised groups, pinpointing the increase in online homophobia following a Supreme Court ruling in Kenya that authorised LGBTQ organisations to be formally registered. She asserts that existing as queer in Kenya is akin to a political act, endangering individuals with stigma, and even death.

Finally, the digitisation of sectors such as sex work and resultant data protection concerns that emerge due to Kenyan users’ data being handled outside the country, leads Minayo to recommend improved awareness of data protection laws, specifically for the evolving digital economy.

In conclusion, Minayo centres her discussion on the importance of contemplating data protection from a broad spectrum, ranging from the necessity for robust regulations to protect sensitive data, the urgency for more resources for non-profit entities, the relevance of data protection across all sectors, and the significance of stakeholder awareness.

Audience

The discourse primarily centres around pressing issues related to data sensitivity and the recognition of diverse gender identities within Kenya’s legal framework. One of the main criticisms in the conversation pertains to the relatively rigid categories of gender identities officially recognised in Kenya, which currently include Male, Female, and occasionally, Intersex. This limited classification, as suggested in the discussion, disregards the broad spectrum of gender identities, leading to negative sentiment surrounding this lack of inclusivity.

Additionally, the classification and handling of sensitive information in the country are scrutinised. Specific emphasis is on the differential treatment of data regarding sexual orientation and gender identity under the Data Protection Act. Whilst the data on sexual orientation is treated as sensitive personal data, data on gender identity is viewed as general data. This discrepancy raises concerns about the absence of a specific law, offering protection against discrimination based on sexual orientation or gender identity in Kenya.

The conversation further extends to the issue of data protection measures, particularly with respect to sex workers. A unique point highlighted by the audience is the necessity to safeguard data associated with this group, emphasising non-profits’ interaction with sex workers and the requirement to guarantee adequate protection measures.

Another point of interest stemming from the dialogue pertains to the influence of Uganda’s Anti-Homosexuality Act on Kenya’s data protection laws. Particularly, concerns are raised about whether the stringent regulation enacted by neighbouring Uganda might impact the LGBT community’s data protection in Kenya.

Platform accountability in Kenya also draws concern from the audience, with particular focus on the efficiency and procedure of incident reporting in cases of data breaches. The police’s involvement in such instances is queried, implying an underlying need for more robust incident response protocols.

A significant part of the conversation is dedicated to the management and confidentiality of health data. Clarification is sought on the mechanisms for sharing health data between facilities, with additional questions being raised about whether individual consent should be obtained each time data is shared. Participants inquire about the legal coordination between the Health Privacy Act and the Data Protection Act, seeking to understand which of the two pieces of legislation primarily governs patient privacy. These discussions shed light on the evident gaps and ambiguities in the country’s data protection and privacy laws, highlighting the public’s demand for a more transparent and protective legal system.

Speakers

&

’Angela

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

&

’Jeremy

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Digital sovereignty in Brazil: for what and for whom? | IGF 2023 Launch / Award Event #187

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report


Audience

The concept of digital sovereignty is being examined from various angles. Brazil, known for its investment in digital sovereignty, has a long tradition of supporting it through the production of technological equipment and open-source code. This highlights their commitment to maintaining control in the digital realm. However, there are concerns regarding the practicality of achieving complete independence in technology, as no country can truly be independent in terms of technology, food, or energy.

Another point of discussion is the need for clarification on how the current project will relate to the research conducted by FGV-CTS, a prominent research institution that has been studying digital sovereignty for a considerable time. This indicates the desire to build upon existing knowledge and ensure consistency in efforts related to digital sovereignty.

The legitimacy of internet governance in a multi-stakeholder environment is considered a complex issue. This is because digital sovereignty and the involvement of various stakeholders in governing the internet raise questions about who should have the authority and power to make decisions and set policies. It requires careful consideration to strike a balance between different interests and ensure fair representation in decision-making processes.

It is important to note that the term sovereignty inherently denotes exclusivity. When people talk about digital sovereignty, they often focus on their own or their community’s interests, without considering the broader implications. This highlights the challenges of defining and implementing digital sovereignty in a globalized and interconnected world.

On a positive note, the removal of ICANN from the sovereign system is seen as advantageous for certain aspects of internet coordination. By separating it from the influence of individual nations, ICANN can operate in a more impartial manner, contributing to more effective and neutral coordination of the internet.

However, there are differing opinions on the feasibility of digital sovereignty. Some argue that it is a fantasy, as sovereignty in a political and legal sense implies exclusivity. They believe that true sovereignty cannot be achieved in the digital realm.

Misunderstood or poorly implemented digital sovereignty may have significant consequences for the fundamental characteristics of the internet. Legislative or regulatory measures imposed under the guise of digital sovereignty could jeopardize the open and decentralized nature of the internet, hindering innovation and limiting access to information.

In contrast, others view sovereignty as a means of reasserting control and empowering individuals in the digital sphere. It is seen as a process term that allows people to assert control over what occurs in the digital realm, enabling them to shape the digital landscape according to their needs and interests.

In summary, discussions around digital sovereignty are multifaceted. While Brazil’s investment in digital sovereignty demonstrates a commitment to control and independence, challenges regarding practicality persist. The relationship between current projects and existing research needs clarification, and the legitimacy of internet governance in a multi-stakeholder environment is a complex matter. The term sovereignty itself carries connotations of exclusivity, and differing perspectives exist regarding the feasibility and implications of digital sovereignty. Ultimately, the aim is to achieve a balanced approach that preserves the fundamental characteristics of the internet while enabling individuals to have control and influence in the digital world.

Flavio Wagner

Brazil, as one of the world’s top 10 largest economies, possesses a robust industry across a variety of sectors, including the digital sphere. this positions brazil as a significant player in the global economy. Brazil has also implemented laws such as the Marco Civil and the privacy law, which are similar to the General Data Protection Regulation (GDPR) in the European Union. These regulations highlight Brazil’s commitment to safeguarding privacy and ensuring justice in the online realm.

However, there are growing concerns about internet fragmentation and digital sovereignty within Brazilian legislative bills and public documents. These concerns indicate a potential risk of unwanted internet fragmentation. Discussions on platform regulation and cybersecurity proposals often emphasise the importance of digital sovereignty as a motivation for proposed bills. The term “digital sovereignty” is increasingly mentioned in Brazilian legislative bills and public documents.

To address these concerns, a project in collaboration with CEPI aims to facilitate academic and public policy debates about sovereignty, connecting the in-depth analysis of the Brazilian context to the regional and global levels. This partnership with CEPI seeks to expand the understanding and knowledge of the academic and public policy discourse on sovereignty issues.

Moreover, the project collaborates with FGV Sao Paolo, a renowned academic institution with numerous groups working in different cities. The collaboration with Flavio Wagner aims to enrich the academic and public policy debates on sovereignty matters.

Despite diverse areas of focus, the project maintains an ongoing dialogue with various groups, including Lucabelli’s team. This continuous engagement enables the exchange of insights and perspectives, contributing to a comprehensive understanding of digital sovereignty within the Brazilian context.

By analysing public documents, bills, and policies, the project aims to comprehend the impact of digital sovereignty on the evolution of the Internet in Brazil. This comprehensive examination is crucial to evaluate potential implications of legislations or regulations tied to digital sovereignty, as there is a concern that they may threaten fundamental characteristics of the Internet.

As a precautionary measure, it is crucial to exercise awareness and discernment in comprehending how sovereignty is utilised and interpreted in relation to the digital economy. The project follows the approach advocated by the Internet Society to ensure a thoughtful and well-informed discussion on digital sovereignty.

Additionally, the project aims to educate and inform individuals about the diverse perspectives on digital sovereignty in Brazil, as well as the social, legal, and technological implications associated with different definitions of sovereignty. This comprehensive understanding will enhance the overall discourse on sovereignty, not only in Brazil but also in other parts of Latin America and globally.

Flavio Wagner recognises the importance of thoughtful evaluation when proposing public policies, regulations, or legislations to address sovereignty issues. This careful consideration is crucial in understanding the potential consequences and impacts they may have.

In conclusion, Brazil’s significant role in the global economy, along with its robust industry and commitment to internet regulation, has sparked discussions on digital sovereignty and its possible implications for the Internet’s evolution in the country. The project, in collaboration with CEPI and FGV Sao Paolo, aims to foster a comprehensive academic and public policy debate that encompasses various perspectives and potential consequences. By analysing the Brazilian context and connecting it to regional and global levels, the project strives to contribute to a more informed and well-rounded discourse on digital sovereignty.

Ana Paula Camelo

The term “digital sovereignty” is frequently mentioned in Brazilian legislative bills and other public documents. However, it lacks a shared definition, creating ambiguity and confusion about its meaning and implications. To address this issue, research has been conducted in partnership with the Brazilian chapter of the Internet Society and the Center for Studies on Freedom of Expression and Access to Information (CEPI).

The research aims to map and discuss the various narratives and stakeholders involved in Brazilian debates surrounding digital sovereignty. This comprehensive analysis, based on desk research, study group discussions, and expert interviews, will contribute to a deeper understanding of the topic.

In addition, an online training course on the issues of digital sovereignty is set to be launched. The course, accessible through the websites of the Brazilian Internet Society and CEPI, will feature recorded lectures, suggested bibliography, and interactive discussion activities. This initiative aims to enhance knowledge and awareness about digital sovereignty among a wide range of individuals.

Digital sovereignty is considered essential for several reasons. It plays a crucial role in self-determination, the regulation of state power, national security, and technological and scientific development. It also intersects with areas such as artificial intelligence, misinformation, and fake news, and serves as a means of protecting the rights of citizens, including those belonging to consumer and minority groups.

Ana Paula Camelo highlights the importance of understanding the Brazilian context in the global discourse on sovereignty. By doing so, it becomes possible to contribute to a more comprehensive and inclusive global narrative. Camelo encourages individuals to engage with the ongoing research, offering feedback and suggestions to facilitate collaboration.

In summary, the term “digital sovereignty” is widely used in Brazilian legislative bills and public documents, but lacks a shared definition. Through research conducted in partnership with the Brazilian Internet Society and CEPI, a comprehensive understanding of the topic is being developed. An upcoming online training course will further promote knowledge and understanding of digital sovereignty. Digital sovereignty is crucial for self-determination, state power regulation, national security, and technological and scientific development. Understanding the Brazilian context is emphasized to contribute to a broader, global narrative on sovereignty.

Raquel Gatto

The concept of digital sovereignty and its connection to internet fragmentation is a major concern for the Internet Society. They have defined fundamental principles and values for the internet and developed a toolkit to assess the impact on these principles. This approach involves continuously evaluating the situation in different regions and countries. They have created impact briefs that provide specific case studies, such as a proposed bill for a law regarding content moderation and fake news in Brazil. This highlights the significance of digital sovereignty in Brazil, where it is a major issue that has led to increased research.

Digital sovereignty encompasses political, technological, and economic aspects, and it is intricately connected to the issue of internet fragmentation. The Internet Society emphasises the importance of understanding different interpretations of sovereignty in the digital sphere. They recognise that capturing these interpretations is essential to safeguarding the fundamental aspects of the internet and ensuring that digital sovereignty does not compromise its core principles.

In their work, the Internet Society also focuses on the broader implications of digital sovereignty, including technological, political, and legal aspects. They highlight the need to consider the potential risks associated with claims of digital sovereignty and the impact they can have on industry, innovation, and infrastructure. By understanding these implications, they aim to contribute to peace, justice, and strong institutions in the digital realm.

Furthermore, researchers like Luca Belli have joined the conversation, bringing their expertise in cybersecurity and a nuanced understanding of digital sovereignty as part of national security protection. This highlights the significance of digital sovereignty in safeguarding nations from potential cyber threats.

Overall, there is a neutral stance towards understanding the implications of digital sovereignty. The Internet Society and other researchers place great importance on gaining a comprehensive understanding of its various dimensions. By doing so, they can contribute to the preservation of a free, open, and secure internet that upholds the fundamental principles and values defined by the Internet Society.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Governing Tech for Peace: a Multistakeholder Approach | IGF 2023 Networking Session #78

Table of contents

Disclaimer: This is not an official record of the IGF session. The DiploAI system automatically generates these resources from the audiovisual recording. Resources are presented in their original format, as provided by the AI (e.g. including any spelling mistakes). The accuracy of these resources cannot be guaranteed. The official record of the session can be found on the IGF's official website.

Knowledge Graph of Debate

Session report


Audience

As a representative of a youth organisation operating under the remit of the United Nations Department of Political and Peacebuilding Affairs (UNDPPA), Manjia exhibits a keen interest in the role that young individuals might fulfil in the ‘Tech for Peace’ initiative. Her focus on youthful involvement originates from a firmly held conviction that engaging this demographic is not merely beneficial but absolutely crucial to the success of the undertaking. However, Manjia’s curiosity is not limited solely to the participation; she also shows a genuine interest in uncovering and scrutinising any established best practices or forthcoming plans connected to fostering youth engagement in ‘Tech for Peace’.

The term ‘Peace Tech’, central to this discourse, warranted clarification, provided intrepidly by the director of Access Now. This term constitutes an umbrella reference encompassing a diverse range of domains, from the advancement of human rights to the safeguarding of environmental justice. The director’s commentary extended beyond mere terminological elucidation, presenting some critical perspectives concerning how ‘Peace Tech’ could be interpreted and utilised.

At the heart of these insights was a concern surrounding ‘techno-solutionism’ or the excessive dependency on digital tools and technology to address inherently complex human challenges. Arguing against the overreliance on technological solutions, the director emphasised the need for traditional peace-building efforts. Hence, he advocates embedding technical discussions within broader dialogues on peace-building and other interrelated sectors to guarantee a comprehensive approach.

These contemplations and sentiments underscore several Sustainable Development Goals (SDGs) set forth by the United Nations. Notably, these viewpoints reflect the core aspirations of SDG 16, which promotes Peace, Justice and Strong Institutions, and SDG 9, oriented around Industry, Innovation and Infrastructure. The dawn of digital rights and the care for ‘techno-solutionism’ serves to underscore the complex relationship between technology and peace-building, shedding light on the concurrent requirement for innovation and circumspection.

Evelyne Tauchnitz

The discourse principally revolved around three domains: peace, human rights, and the influence of technology. Central to the discussion was Evelyne’s comprehensive definition of peace. She emphasised that peace extends beyond the mere absence of direct or physical violence. Peace should also incorporate the eradication of structural and cultural violence, forms of oppression that can prevail in society even without overt conflict.

Evelyne underscored the integral role that human rights have in defining our comprehension of peace and ‘peace tech’. She identified human dignity and freedom as the cornerstone values that bind together peace and human rights. She argued that these principles ought to form the bedrock when evaluating peace technologies. The central argument was rooted in the notion that any advancement in technology should not infringe upon basic human rights under the pretext of facilitating peace. If a technology is found transgressing these human rights, its categorisation as ‘peace tech’ becomes problematic.

However, Evelyne expressed her concerns that not all technologies, notwithstanding being labelled as ‘peace tech’, necessarily harmonise with the values of peace and human rights. This suggests a need for more stringent scrutiny of such technologies and the establishment of robust standards for defining and categorising ‘peace tech’.

The symbiosis between human rights and peace was further analysed, affirming that respect for human rights is indispensable but not ample for peace. Peace was envisaged as a broader concept that transcends the domain of legal enforcement of rights. In contrast, human rights were characterised as more narrow in scope, subject to legal enforceability.

An additional perspective broached was the potential paradigm shift in our perception of peace due to digital transformation. Evelyne posited, optimistically, that digital technologies could be leveraged to forge a more comprehensive peace. However, she also underlined the necessity for prudence, especially in instances such as social scoring systems, currently instrumental in China for rebuilding societal trust.

On the whole, the discussion reiterates that while technology and human rights are pivotal in shaping peace, vigilance is required to ensure that the pursuit of peace does not inadvertently engender inequality or violate fundamental human rights.

Moses Owainy

Moses Owainy, the esteemed CEO of Uganda’s Centre for Multilateral Affairs, brings to light the necessity for a more diversified dialogue in peace tech, asserting the significance of integrating a multitude of global perspectives. Concentrating his argument on Sustainable Development Goals (SDGs) 16 and 9 – namely peace, justice, strong institutions, industry, innovation and infrastructure – Owainy stresses the need to embrace a wide range of viewpoints while deliberating peace tech initiatives.

Owainy adeptly highlights a key consideration: the varying impact of peace tech in different geographical contexts. He underscores that results of these tech endeavours differ noticeably between regions such as Uganda, Kenya or Nigeria and their deployment in more advanced economies. This accentuates the pressing need for context-sensitive, adaptive approaches to peace tech in diverse socioeconomic landscapes to ensure equitable outcomes.

Simultaneously, Owainy instigates a discussion on the very terminology used in peace tech dialogue, criticising the commonly used term ‘global peace’. He denotes its inherent ambiguity, advocating instead for the term ‘international peace’. Owainy asserts that this revised term would better embody the collaborative efforts between various states and multi-stakeholder groups, in their shared pursuit of peace.

In conclusion, Owainy’s insights guide towards a more inclusive and adaptable narrative in peace tech, suggesting a shift in terminology for clearer understanding and collaboration. His observations also underscore the need for nuanced, context-specific application of peace technologies, acknowledging regional differences and necessity of adaptability.

Marielza Oliveira

Marielza Oliveira acts in the prestigious role of Director for Digital Inclusion, Policies, and Transformation at UNESCO, guiding the organisation’s endeavours towards the advancement of digital inclusion and policy transformation whilst supporting the broad Sustainable Development Goals (SDGs) of fostering innovation and reducing inequalities. Her work is primarily centred around the protection of two fundamental human rights: freedom of expression and the right to access information.

A crucial aspect of this role is their commitment to UNESCO’s ultimate mandate; fostering peace in the minds of men and women and facilitating the unhindered flow of ideas. This aspiration is brought to fruition through various media, underlining the value UNESCO accords to the digital ecosystem.

To guarantee the regulatory approach towards internet platforms also respects this mandate, UNESCO has emphasised the necessity of regulations that uphold human rights. This conversation was furthered in its recent ‘Internet for Trust’ conference, demonstrating the organisation’s positive sentiment towards internet regulation sensitive to human rights.

Moreover, UNESCO intends to build the capacities of stakeholders to counter digital exclusion and inequality. This ambitious goal will enable better participation in the digital ecosystem, striving for a more inclusive internet environment. These capacity-building efforts strongly align with SDGs centred on industry, innovation, and infrastructure, as well as reduced inequalities.

In regard to achieving such aims, significant results are being accomplished through multi-stakeholder approaches. These alliances involving tech companies and government agencies aim at maximising opportunities and fostering a diverse cohort of partners. Examples of these advancements include the ‘AI for the Planet’ project combatting climate change and the United Nations Technology Innovation Lab utilising technology innovatively to foster peace-building. ‘Social Media for Peace’ is another remarkable project designed to combat online polarisation.

UNESCO stresses the importance of ensuring that internet regulation does not infringe upon the rights to freedom of expression and access to information. The organisation is currently planning to release guidelines encouraging an environment of regulation that emphasises processes rather than content, promoting transparency and accountability. This approach counters potential restrictions that could limit the freedom of expression for journalists, activists, and others.

The analysis underscores UNESCO’s leadership role in utilising technology and promoting digital inclusivity to achieve significant societal benefits and its commitment to embedding these principles within its operational structure and processes. It’s robust standing on maintaining a balanced approach to internet regulation, which safeguards human rights whilst promoting accountability, underpins its dedication towards peace, justice, and robust institutions. Such commitment reflects the considerable correlation between UNESCO’s operations and the wider SDGs.

Mark Nelson

Co-directors Mark Nelson and Margarita Quihuis are spearheading significant advancements in peace technology at both the Peace Innovation Lab at Stanford and the Peace Innovation Institute in The Hague, striving to commercialise their peace technology research. This pioneering approach, utilising modern technology, aims to reshape how peace is perceived and established globally.

A fundamental component of this research is the use of sensor technology. In the last two decades, sensors capable of detecting and monitoring human social behaviour have seen groundbreaking advancements, transforming how human interactions are observed and understood in real time. This invaluable insight underpins the development of detailed peace metrics in high resolution.

The concept of ‘persuasive peace’ lies at the heart of their innovation, favouring influence-based strategies over conventional coercive tactics. By crafting customised approaches suited to varying individual circumstances, they are redefining how peace is achieved and maintained.

An essential element of their endeavours is to establish a essential link connecting peace technology with capital markets to create a viable ‘peace finance’ investment sector. They aim to capitalise on the intrinsic but often unquantifiable value of peace, setting the stage for a new era of peacekeeping and conflict resolution strategies.

To summarise, Nelson and Quihuis’ groundbreaking work embodies a progressive approach to advancing the principles encapsulated in SDG 16 (Peace, Justice, and Strong Institutions) and SDG 9 (Industry, Innovation and Infrastructure), demonstrating the transformative power of technology in the pursuit of peace. Their efforts are leading the way in peace innovation, reshaping our understanding of peace, and developing or promulgating peace technology as a crucial aspect of infrastructure development and peacekeeping strategies.

Moderator

The debate primarily delves into the interplay between technology and peace, with a focus on the contemporary role of technology in fostering peace across varying social contexts, as evidenced through initiatives such as the Global Peace Tech Hub. This initiative, championed for advocating the responsible use of technology, centralises on the principle of instigating cross-sector dialogues and sharing enthusiasm for the possibilities that technology can provide in the attainment of peace.

The discourse also recognises the dual aspect of technology as both an agent of positive change and a potential risk. This bipolar facet of technological advancement was brought into the spotlight, with the positive influences such as the enhancement of democracy and increased access to services being weighed against the negative implications such as the promotion of misinformation and the potential to catalyse societal polarisation. Going forward, the panel agrees unanimously that strategies are required to be formulated to mitigate these risks if technology’s full potential for peace promotion is to be exploited.

UNESCO’s efforts at encouraging climate action with projects like AI for the Planet are highlighted as an epitome of how collaborations among diverse parties in the technological arena can result in meaningful outcomes, even when corporations are unable to commit substantial resources. The use of technology to counteract climate change receives a positive appraisal, especially when it supports initiatives that allow various actors to make a pronounced difference without substantial, long-term commitments.

Additionally, the dialogue underscored the significance of the partnership between UNESCO and the European Commission, embodied in the Social Media for Peace project. These efforts, seen as integral to initiatives such as the Internet for Trust guidelines, aim to regulate internet platforms not through content, but through process, asserting the importance of transparency and accountability in this space.

An essential reflection in the debate is the profound transformation peace technology has undergone. Innovative advancements enabling real-time analysis of human behaviour and interactions have led to a significant shift from coercive peace mechanisms towards more persuasive peace technology. This evolution has been lauded as a historic shift for the human species, opening the potential for fostering peace through persuasion rather than coercion.

The role of the youth in propelling human rights and peace movements, despite the inherent risks associated with digital activism, is highlighted. The willingness of young people from countries, including Thailand, Sudan, and the USA, to remain in the forefront of these movements, despite potential threats like spyware attacks and concerns over digital permanence, is noted.

Also significant is the sense of mistrust within certain societal factions. Phrases such as ‘peace tech’ and ‘tech for good’ are seen as potentially contributing to a trust deficit, with neither the technology sectors nor large humanitarian agencies being considered entirely trustworthy when it comes to personal data.

Finally, with the array of perspectives on peacekeeping through technology, the shared consensus was the need for continuous dialogue within the tech community. Seen as crucial to dismantle existing silos and establish a common understanding of technology’s role in peace, this call for consistent multi-stakeholder dialogue served as a central theme throughout the discussion. The breadth of opinions within the peace tech community, from seeing technology as a tool for peace to viewing it as a new battleground, or even a threat to peace, further underlines the importance of these dialogues.

Speaker

The concept of peace transcends the domains of security, extending to incorporate values of freedom and equality. It constitutes a comprehensive vision for societies’ development that endeavours to eliminate all forms of violence – direct, structural, and cultural. However, this idealistic vision can face threats from inappropriate use of technology. Instances where technologies infringe upon human rights pose a significant issue for peace and security on a global scale. Regrettably, the notion of peace can be misappropriated as a brand for technologies that may not contribute to harmonious societies.

Concurrently, recognising the potential of technological advancements, the United Nations is diligently prioritising digital transformation and technology. The UN Secretary General has been vigorous in advocating for this priority, particularly within the realm of cyber security. A testament to this focused effort is the creation of the Office of the Technology Envoy, established to champion these changes on a grand scale. Indeed, there’s a burgeoning understanding of the need for the UN Security Council to incorporate the monitoring of digital and cyber roles into their mandates, signalling the significance placed on technology in global security guidelines.

Nevertheless, amid these advancements, concerns regarding the right to access the internet and freedom of expression persist as substantial challenges in the digital era. Access Now, a focused human rights organisation, primarily champions these digital rights. Incidents like the deployment of spyware during the Armenia-Azerbaijan conflict highlight how tech misuse can affect peace negotiators and exacerbate conflicts. Furthermore, the role of social media platforms in content governance can hold far-reaching implications during crisis times, a stern reminder that technology can be a double-edged sword. In extreme situations, internet shutdowns have inflicted harm on human rights and obstructed conflict resolution.

Indeed, human rights are a necessary condition for peace. Nonetheless, peace as a concept demands a more comprehensive understanding and acceptance, exceeding that of human rights alone. Concord isn’t exclusively about respect for human rights but also significantly involves the mechanisms and ethics by which specific political decisions are made.

The digitisation of society could conceivably impact our comprehension and notion of peace. Young individuals are poised to play a key role within this transformative process. Impressively, youth across the globe are already spearheading movements championing human rights and peace, frequently risking their personal safety in pursuit of these causes.

Nevertheless, a pronounced trust deficit exists towards tech sectors and large humanitarian agencies handling personal data. Passive monitoring via ubiquitous sensors is viewed as a threat, illuminating the public’s discomfort with potential breaches of privacy. This underlines the challenge of striking a balance between leveraging technological advances and safeguarding human rights and security. Thus, whilst digital advancement offers vast potential for societal development, it is crucial to remain cognisant of their inherent risks to maintain peace, justice, and strong institutions.

Speakers

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more

Speech speed

0 words per minute

Speech length

words

Speech time

0 secs

Click for more