Governing Artificial Intelligence: Upholding Human Rights & Dignity


Report by Mark Latonero that “…shows how human rights can serve as a “North Star” to guide the development and governance of artificial intelligence.

The report draws the connections between AI and human rights; reframes recent AI-related controversies through a human rights lens; and reviews current stakeholder efforts at the intersection of AI and human rights.

This report is intended for stakeholders–such as technology companies, governments, intergovernmental organizations, civil society groups, academia, and the United Nations (UN) system–looking to incorporate human rights into social and organizational contexts related to the development and governance of AI….(More)”.

Human Rights in the Big Data World


Paper by Francis Kuriakose and Deepa Iyer: “Ethical approach to human rights conceives and evaluates law through the underlying value concerns. This paper examines human rights after the introduction of big data using an ethical approach to rights. First, the central value concerns such as equity, equality, sustainability and security are derived from the history of digital technological revolution. Then, the properties and characteristics of big data are analyzed to understand emerging value concerns such as accountability, transparency, tracability, explainability and disprovability.

Using these value points, this paper argues that big data calls for two types of evaluations regarding human rights. The first is the reassessment of existing human rights in the digital sphere predominantly through right to equality and right to work. The second is the conceptualization of new digital rights such as right to privacy and right against propensity-based discrimination. The paper concludes that as we increasingly share the world with intelligence systems, these new values expand and modify the existing human rights paradigm….(More)”.

The law and ethics of big data analytics: A new role for international human rights in the search for global standards


David Nersessian at Business Horizons: “The Economist recently declared that digital information has overtaken oil as the world’s most valuable commodity. Big data technology is inherently global and borderless, yet little international consensus exists over what standards should govern its use. One source of global standards benefitting from considerable international consensus might be used to fill the gap: international human rights law.

This article considers the extent to which international human rights law operates as a legal or ethical constraint on global commercial use of big data technologies. By providing clear baseline standards that apply worldwide, human rights can help shape cultural norms—implemented as ethical practices and global policies and procedures—about what businesses should do with their information technologies. In this way, human rights could play a broad and important role in shaping business thinking about the proper handling of this increasingly valuable commodity in the modern global society…(More)”.

Legitimacy in Global Governance: Sources, Processes, and Consequences


Book edited by Jonas Tallberg, Karin Backstrand, and Jan Aart Scholte: “Legitimacy is central for the capacity of global governance institutions to address problems such as climate change, trade protectionism, and human rights abuses. However, despite legitimacy’s importance for global governance, its workings remain poorly understood. That is the core concern of this volume: to develop an agenda for systematic and comparative research on legitimacy in global governance. In complementary fashion, the chapters address different aspects of the overarching question: whether, why, how, and with what consequences global governance institutions gain, sustain, and lose legitimacy?

The volume makes four specific contributions. First, it argues for a sociological approach to legitimacy, centered on perceptions of legitimate global governance among affected audiences. Second, it moves beyond the traditional focus on states as the principal audience for legitimacy in global governance and considers a full spectrum of actors from governments to citizens. Third, it advocates a comparative approach to the study of legitimacy in global governance, and suggests strategies for comparison across institutions, issue areas, countries, societal groups, and time. Fourth, the volume offers the most comprehensive treatment so far of the sociological legitimacy of global governance, covering three broad analytical themes: (1) sources of legitimacy, (2) processes of legitimation and delegitimation, and (3) consequences of legitimacy…(More)”.

Constitutional Democracy and Technology in the age of Artificial Intelligence


Paul Nemitz at Royal Society Philosophical Transactions: “Given the foreseeable pervasiveness of Artificial Intelligence in modern societies, it is legitimate and necessary to ask the question how this new technology must be shaped to support the maintenance and strengthening of constitutional democracy.

This paper first describes the four core elements of today’s digital power concentration, which need to be seen in cumulation and which, seen together, are both a threat to democracy and to functioning markets. It then recalls the experience with the lawless internet and the relationship between technology and the law as it has developed in the internet economy and the experience with GDPR before it moves on to the key question for AI in democracy, namely which of the challenges of AI can be safely and with good conscience left to ethics, and which challenges of AI need to be addressed by rules which are enforceable and encompass the legitimacy of democratic process, thus laws.

The paper closes with a call for a new culture of incorporating the principles of Democracy, Rule of law and Human Rights by design in AI and a three level technological impact assessment for new technologies like AI as a practical way forward for this purpose….(More).

AI and Big Data: A Blueprint for a Human Rights, Social and Ethical Impact Assessment


Alessandro Mantelero in Computer Law & Security Review: “The use of algorithms in modern data processing techniques, as well as data-intensive technological trends, suggests the adoption of a broader view of the data protection impact assessment. This will force data controllers to go beyond the traditional focus on data quality and security, and consider the impact of data processing on fundamental rights and collective social and ethical values.

Building on studies of the collective dimension of data protection, this article sets out to embed this new perspective in an assessment model centred on human rights (Human Rights, Ethical and Social Impact Assessment-HRESIA). This self-assessment model intends to overcome the limitations of the existing assessment models, which are either too closely focused on data processing or have an extent and granularity that make them too complicated to evaluate the consequences of a given use of data. In terms of architecture, the HRESIA has two main elements: a self-assessment questionnaire and an ad hoc expert committee. As a blueprint, this contribution focuses mainly on the nature of the proposed model, its architecture and its challenges; a more detailed description of the model and the content of the questionnaire will be discussed in a future publication drawing on the ongoing research….(More)”.

Denialism: what drives people to reject the truth


Keith Kahn-Harris at The Guardian: “…Denialism is an expansion, an intensification, of denial. At root, denial and denialism are simply a subset of the many ways humans have developed to use language to deceive others and themselves. Denial can be as simple as refusing to accept that someone else is speaking truthfully. Denial can be as unfathomable as the multiple ways we avoid acknowledging our weaknesses and secret desires.

Denialism is more than just another manifestation of the humdrum intricacies of our deceptions and self-deceptions. It represents the transformation of the everyday practice of denial into a whole new way of seeing the world and – most important – a collective accomplishment. Denial is furtive and routine; denialism is combative and extraordinary. Denial hides from the truth, denialism builds a new and better truth.

In recent years, the term has been used to describe a number of fields of “scholarship”, whose scholars engage in audacious projects to hold back, against seemingly insurmountable odds, the findings of an avalanche of research. They argue that the Holocaust (and other genocides) never happened, that anthropogenic (human-caused) climate change is a myth, that Aids either does not exist or is unrelated to HIV, that evolution is a scientific impossibility, and that all manner of other scientific and historical orthodoxies must be rejected.

In some ways, denialism is a terrible term. No one calls themselves a “denialist”, and no one signs up to all forms of denialism. In fact, denialism is founded on the assertion that it is not denialism. In the wake of Freud (or at least the vulgarisation of Freud), no one wants to be accused of being “in denial”, and labelling people denialists seems to compound the insult by implying that they have taken the private sickness of denial and turned it into public dogma.

But denial and denialism are closely linked; what humans do on a large scale is rooted in what we do on a small scale. While everyday denial can be harmful, it is also just a mundane way for humans to respond to the incredibly difficult challenge of living in a social world in which people lie, make mistakes and have desires that cannot be openly acknowledged. Denialism is rooted in human tendencies that are neither freakish nor pathological.

All that said, there is no doubt that denialism is dangerous. In some cases, we can point to concrete examples of denialism causing actual harm. In South Africa, President Thabo Mbeki, in office between 1999 and 2008, was influenced by Aids denialists such as Peter Duesberg, who deny the link between HIV and Aids (or even HIV’s existence) and cast doubt on the effectiveness of anti-retroviral drugs. Mbeki’s reluctance to implement national treatment programmes using anti-retrovirals has been estimated to have cost the lives of 330,000 people. On a smaller scale, in early 2017 the Somali-American community in Minnesota was struck by a childhood measles outbreak, as a direct result of proponents of the discredited theory that the MMR vaccine causes autism, persuading parents not to vaccinate their children….(More)”.

Cloud Communities: The Dawn of Global Citizenship?


Robert Schuman Centre for Advanced Studies Research Paper by Liav Orgad and Rainer Baubock: “New digital technologies are rapidly changing the global economy and have connected billions of people in deterritoralised social network. Will they also create new opportunities for global citizenship and alternatives to state-based political communities?

In his kick-off essay, Liav Orgad takes an optimistic view. Blockchain technology permits to give every human being a unique legal persona and allows individuals to associate in ‘cloud communities’ that may take on several functions of territorial states. 14 commentators discuss this vision.

Sceptics assume that states or business corporations have always found ways to capture and use new technologies for their purposes. They emphasise that the political functions of states, including their task to protect human rights, require territorial monopolies of legitimate coercion that cannot be provided by cloud communities.

Others point out that individuals would sort themselves out into cloud communities that are internally homogenous which risks to deepen political cleavages within territorial societies.

Finally, some authors are concerned that digital political communities will enhance global social inequalities through excluding from access those who are already worse off in the birthright lottery of territorial citizenship.

Optimists see instead the great potential of blockchain technology to overcome exclusion and marginalisation based on statelessness or sheer lack of civil registries; they regard it as a tool for enhancing individual freedom, since people are self-sovereign in controlling their personal data; and they emphasise the possibilities for emancipatory movements to mobilise for global justice across territorial borders or to create their own internally democratic political utopias.

In the boldest vision, the deficits of cloud communities as voluntary political associations with limited scope of power could be overcome in a global cryptodemocracy that lets all individuals participate on a one-person-one-vote basis in global political decisions….(More)”.

Information Asymmetries, Blockchain Technologies, and Social Change


Reflections by Stefaan Verhulst on “the potential (and challenges) of Distributed Ledgers for “Market for Lemons” Conditions: We live in a data age, and it has become common to extol the transformative power of data and information. It is now conventional to assume that many of our most pressing public problems—everything from climate change to terrorism to mass migration—are amenable to a “data fix.”

The truth, though, is a little more complicated. While there is no doubt that data—when analyzed and used responsibly—holds tremendous potential, many factors affect whether, and to what extent, that potential will ultimately be fulfilled.

Our ability to address complex public problems using data depends vitally on how our respective data ecosystems is designed (as well as ongoing questions of representation in, power over, and stewardship of these ecosystems).

Flaws in our data ecosystem that prevent us from addressing problems; may also be responsible for many societal failures and inequalities result from the fact that:

  • some actors have better access to data than others;
  • data is of poor quality (or even “fake”); contains implicit bias; and/or is not validated and thus not trusted;
  • only easily accessible data are shared and integrated (“open washing”) while important data remain carefully hidden or without resources for relevant research and analysis; and more generally that
  • even in an era of big and open data, information too often remains stove-piped, siloed, and generally difficult to access.

Several observers have pointed to the relationship between these information asymmetries and, for example, corruption, financial exclusion, global pandemics, forced mass migration, human rights abuses, and electoral fraud.

Consider the transaction costs, power inequities and other obstacles that result from such information asymmetries, namely:

–     At the individual level: too often someone who is trying to open a bank account (or sign up for new cell phone service) is unable to provide all the requisite information, such as credit history, proof of address or other confirmatory and trusted attributes of identity. As such, information asymmetries are in effect limiting this individual’s access to financial and communications services.

–     At the corporate level, a vast body of literature in economics has shown how uncertainty over the quality and trustworthiness of data can impose transaction costs, limit the development of markets for goods and services, or shut them down altogether. This is the well-known “market for lemons” problem made famous in a 1970 paper of the same name by George Akerlof.

–     At the societal or governance level, information asymmetries don’t just affect the efficiency of markets or social inequality. They can also incentivize unwanted behaviors that cause substantial public harm. Tyrants and corrupt politicians thrive on limiting their citizens’ access to information (e.g., information related to bank accounts, investment patterns or disbursement of public funds). Likewise, criminals, operate and succeed in the information-scarce corners of the underground economy.

Blockchain technologies and Information Asymmetries

This is where blockchain comes in. At their core, blockchain technologies are a new type of disclosure mechanism that have the potential to address some of the information asymmetries listed above. There are many types of blockchain technologies, and while I use the blanket term ‘blockchain’ in the below for simplicity’s sake, the nuances between different types of blockchain technologies can greatly impact the character and likelihood of success of a given initiative.

By leveraging a shared and verified database of ledgers stored in a distributed manner, blockchain seeks to redesign information ecosystems in a more transparent, immutable, and trusted manner. Solving information asymmetries may be the real potential of blockchain, and this—much more than the current hype over virtual currencies—is the real reason to assess its potential….(More)”.

Defending Politically Vulnerable Organizations Online


Center for Long-Term Cybersecurity (CLTC): “A new report …details how media outlets, human rights groups, NGOs, and other politically vulnerable organizations face significant cybersecurity threats—often at the hands of powerful governments—but have limited resources to protect themselves. The paper, “Defending Politically Vulnerable Organizations Online,” by CLTC Research Fellow Sean Brooks, provides an overview of cybersecurity threats to civil society organizations targeted for political purposes, and explores the ecosystem of resources available to help these organizations improve their cybersecurity.

“From mass surveillance of political dissidents in Thailand to spyware attacks on journalists in Mexico, cyberattacks against civil society organizations have become a persistent problem in recent years,” says Steve Weber, Faculty Director of CLTC. “While journalists, activists, and others take steps to protect themselves, such as installing firewalls and anti-virus software, they often lack the technical ability or capital to establish protections better suited to the threats they face, including phishing. Too few organizations and resources are available help them expand their cybersecurity capabilities.”

To compile their report, Brooks and his colleagues at CLTC undertook an extensive open-source review of more than 100 organizations supporting politically vulnerable organizations, and conducted more than 30 interviews with activists, threat researchers, and cybersecurity professionals. The report details the wide range of threats that politically vulnerable organizations face—from phishing emails, troll campaigns, and government-sanctioned censorship to sophisticated “zero-day” attacks—and it exposes the significant resource constraints that limit these organizations’ access to expertise and technology….(More)”.