Protecting Children in Cyberconflicts


Paper by Eleonore Pauwels: “Just as digital technologies have transformed myriad aspects of daily life, they are now transforming war, politics and the social fabric.

This rapid analysis examines the ways in which cyberconflict adversely affects children and offers actions that could strengthen safeguards to protect them.

Cyberconflict can impact children directly or indirectly. Harms range from direct targeting for influence and recruitment into armed forces and armed groups, to personal data manipulation and theft, to cyber attacks on infrastructure across sectors critical to child well-being such as education and health facilities.

Many experts believe that the combination of existing international humanitarian law, international criminal law, human rights law, and child rights law is adequate to address the emerging issues posed by cyberconflict. Nevertheless, several key challenges persist. Attribution of cyber attacks to specific actors and ensuring accountability has proven challenging, particularly in the so-called grey zone between war and peace.

There is an urgent need to clarify how child rights apply in the digital space and for Member States to place these rights at the centre of regulatory frameworks and legislation on new technologies…(More)”.

Use of Data in Public Sector Human Resources and Workforce Management: Solutions and Challenges


White Paper by Katherine Barrett and Richard Greene: “Across the U.S., a growing number of cities, counties, and states are using data across agencies to improve management and make decisions—and HR and payroll professionals in particular stand to gain much from this data to help drive staffing and other strategic decisions. In this white paper, industry experts Katherine Barrett and Richard Greene take a deep dive into both the benefits and challenges of using data with real-life examples of how data has been instrumental in building a resilient HR apparatus.

Data can be used for positive change that includes shorter new-hire onboarding, fairer overtime distribution, and even improved employee safety. However, obstacles to using data in an optimal way to improve HR management, such as insufficient funding, lack of training, and lack of software access, can keep government organizations from making the most of all it can offer.

Despite barriers, many organizations are moving toward creating a culture that is conducive to the use of the data their computers can create. Examples of how data and data analysis can transform workforce management practices include:

  • Studying existing hiring and onboarding data to facilitate more effective and efficient administration
  • Tracking turnover data to document employee departures and reveal information about those most at risk of sudden departure
  • Reducing overtime by using the data to ensure fairer distribution of overtime
  • Uncovering equity issues by assessing and comparing the demographic makeup of a workforce to see how closely it matches their population…(More)”

Energy Data Sharing: The Case of EV Smart Charging


Paper by Sean Ennis and Giuseppe Colangelo: “The green and digital transitions are concomitantly underway. In its upcoming Action Plan on Digitalisation of Energy, the European Commission aims to develop a digital-driven “European energy data space” to allow for data sharing and system integration between the energy sector and other sectors, e.g. mobility.

CERRE  has begun working at the intersection of digital and energy with a new, cross-sector research initiative aimed at identifying the business case and governance principles for the development of a European energy data space, using the concrete example of smart electric vehicle charging points, which will play an important role in increasing the flexibility and efficiency of the energy sector.

Key research questions to be addressed as part of the project are:

  • What property rights are included within the smart charging data?
  • What is the business case for industry players and customers to share their data?
  • What should be the overarching principles governing a European energy data space?
  • What government interventions or data standards are required to make specific use cases successful for achieving green transition goals?..(More)”.

Confronting Reality in Cyberspace: Foreign Policy for a Fragmented Internet


Report by Council on Foreign Affairs Task Force: “…The Task Force proposes three pillars to a foreign policy that should guide Washington’s adaptation to today’s more complex, variegated, and dangerous cyber realm.

First, Washington should confront reality and consolidate a coalition of allies and friends around a vision of the internet that preserves—to the greatest degree possible—a trusted, protected international communication platform.

Second, the United States should balance more targeted diplomatic and economic pressure on adversaries, as well as more disruptive cyber operations, with clear statements about self-imposed restraint on specific types of targets agreed to among U.S. allies.

Third, the United States needs to put its own proverbial house in order. That requirement calls for Washington to link more cohesively its policy for digital competition with the broader enterprise of national security strategy.

The major recommendations of the Task Force are as follows:

  • Build a digital trade agreement among trusted partners.
  • Agree to and adopt a shared policy on digital privacy that is interoperable with Europe’s General Data Protection Regulation (GDPR).
  • Resolve outstanding issues on U.S.-European Union (EU) data transfers.
  • Create an international cybercrime center.
  • Launch a focused program for cyber aid and infrastructure development.
  • Work jointly across partners to retain technology superiority.
  • Declare norms against destructive attacks on election and financial systems.
  • Negotiate with adversaries to establish limits on cyber operations directed at nuclear command, control, and communications (NC3) systems.
  • Develop coalition-wide practices for the Vulnerabilities Equities Process (VEP).
  • Adopt greater transparency about defend forward actions.
  • Hold states accountable for malicious activity emanating from their territories.
  • Make digital competition a pillar of the national security strategy.
  • Clean up U.S. cyberspace by offering incentives for internet service providers (ISPs) and cloud providers to reduce malicious activity within their infrastructure.
  • Address the domestic intelligence gap.
  • Promote the exchange of and collaboration among talent from trusted partners.
  • Develop the expertise for cyber foreign policy.

A free, global, and open internet was a worthy aspiration that helped guide U.S. policymakers for the internet’s first thirty years. The internet as it exists today, however, demands a reconsideration of U.S. cyber and foreign policies to confront these new realities. The Task Force believes that U.S. goals moving forward will be more limited and thus more attainable, but the United States needs to act quickly to design strategies and tactics that can ameliorate an urgent threat…(More)”.

Non-Fungible Tokens (NFTs)


Report by the Congressional Research Service:Non-fungible tokens (NFTs) have become popular as unique and non-interchangeable units of data that signify ownership of associated digital items, such as images, music, or videos. Token “ownership” is recorded and tracked on a blockchain (a digital database that records data on a decentralized network of computers without the use of a central authority). In the future, supporters believe NFTs will be used as digital representations of physical items, such as a deed to a house or title to a car. NFTs are commonly used to record and represent ownership of an item, verify authenticity, and enable exchange. However, they do not necessarily reflect the legal ownership of an asset or grant copyright to a digital or physical item. NFT owners purchase only the right to the NFT’s blockchain metadata or “token,” not the underlying asset, unless otherwise specified in external contracts or terms and conditions. NFTs share many similarities with cryptocurrencies, and they are commonly bought and traded using cryptocurrency. Both NFTs and cryptocurrencies are built and tracked on blockchains, and they share much of the same customer and community base. However, cryptocurrencies are fungible, meaning interchangeable, whereas NFTs are unique and therefore non-fungible. Most users create and buy NFTs on dedicated NFT marketplaces. For a typical NFT, it is created or “minted” on a blockchain, auctioned off or sold at a fixed price on an NFT marketplace, and “stored”in the buyer’s digital wallet. Smart contracts (self-executing contracts or lines of computer code on a blockchain) can mint NFTs or transfer them from one owner to another. In combination, blockchains and smart contracts are the backbone of the NFT ecosystem…

Report by the Congressional Research Service: “Non-fungible tokens (NFTs) have become popular as unique and non-interchangeable units of data that signify ownership of associated digital items, such as images, music, or videos. Token “ownership” is recorded and tracked on a blockchain (a digital database that records data on a decentralized network of computers without the use of a central authority). In the future, supporters believe NFTs will be used as digital representations of physical items, such as a deed to a house or title to a car. NFTs are commonly used to record and represent ownership of an item, verify authenticity, and enable exchange. However, they do not necessarily reflect the legal ownership of an asset or grant copyright to a digital or physical item. NFT owners purchase only the right to the NFT’s blockchain metadata or “token,” not the underlying asset, unless otherwise specified in external contracts or terms and conditions. NFTs share many similarities with cryptocurrencies, and they are commonly bought and traded using cryptocurrency. Both NFTs and cryptocurrencies are built and tracked on blockchains, and they share much of the same customer and community base. However, cryptocurrencies are fungible, meaning interchangeable, whereas NFTs are unique and therefore non-fungible. Most users create and buy NFTs on dedicated NFT marketplaces. For a typical NFT, it is created or “minted” on a blockchain, auctioned off or sold at a fixed price on an NFT marketplace, and “stored”in the buyer’s digital wallet. Smart contracts (self-executing contracts or lines of computer code on a blockchain) can mint NFTs or transfer them from one owner to another. In combination, blockchains and smart contracts are the backbone of the NFT ecosystem…

Despite substantial market growth over the past two years, NFTs are still relatively nascent. In their current form, NFTs have implications in a variety of policy areas:
– Consumer protection. There are a number of risks to consumers in the NFT ecosystem, and some NFT marketplaces and digital wallets lack basic features to protect consumers from fraud and misleading or deceptive practices.
– Financial regulation. Depending on the purpose and use of NFTs, some NFTs and NFT platforms may fall under existing financial regulatory regimes and definitions.
– Copyright and intellectual property. The relationship between NFTs and the legal ownership of digital or physical property is unclear. Some existing regulations may impact NFT markets.
– Energy and environmental. Both minting and selling NFTs require substantial amounts of energy, which has raised concerns about their environmental impact…(More)”.

Global Data Governance Mapping Project: Year Two Report


Report by Thomas Struett, Adam Zable, and Susan Ariel Aaronson, Ph.D.: “…The Digital Trade and Data Governance Hub (the Hub) seeks to help policymakers and the public understand how governments around the world govern data. For many governments, governing various types of data has become an essential, albeit challenging, task, because government officials must justify and launch new strategies, structures, policies, and processes. In 2021 researchers at the Hub designed a new evidence-based metric to characterize a comprehensive approach to data governance at both the national and international levels. We hoped that by doing so, we could help create a broader understanding of data governance. 

The OECD defines data governance as principles and policy guidance on how governments can maximize the cross-sectoral benefits of all types of data (personal, non-personal, open, proprietary, public, and private) while protecting the rights of individuals and organizations.3 A comprehensive approach includes strategies, policies, processes, and organizational structure. A comprehensive approach also governs different types of data use and re-use. 

The Hub’s metric includes 6 attributes of data governance (strategies; laws and regulations; structural changes; human rights and ethical guidelines; involving their public; and mechanisms for international cooperation). We then use 26 indicators which provide evidence of comprehensive governance. 

Key Findings 

01. Consistent performance over the two year period The UK, Germany, Australia, New Zealand, and France take the most comprehensive approach to data governance at the national and international levels. This finding is consistent with our first iteration, where these countries were also in the top five (See Chart 1). 

02. Income disparities in data governance Taking our attributes in sum, what the World Bank terms high income nations do more to govern data and in particular do more on the international and responsible attributes. In contrast, lower and middle income countries tend to focus their data governance efforts on structural or regulatory actions to govern data rather than develop strategies or put forward human rights/ethical guidelines (Chart 2 and 3). 

03. Shared evidence of key components of comprehensive data governance Most of our case studies have enacted or created a freedom of information law, an open data portal, a public data protection law, and a public consultation related to data governance or data driven sectors (Chart 4). 

04. Growing importance of digital trade agreements as a form of data governance We noted an increase in the number of nations adhering to a trade agreement with the free flow of data (with exceptions) as the default. 

05. Advice from experts Most nations have created advisory committees to govern data and data driven technologies, but these committees are mainly composed of representatives of business, government, and academia rather than representatives of the broad public. By including such representatives, policymakers may be better able to anticipate and understand data driven issues that could affect public trust.

06. Policymakers are generally not responsive to public concerns regarding data governance Although most countries seek public comment on proposed laws and regulations related to data, we have little evidence that policymakers revise their data governance policies in response to public concerns…(More)”.

Reimagining Data and Power: A roadmap for putting values at the heart of data


Paper by The Data Values Project: “This paper sets out the key themes that emerged from the consultation and describes a collective vision for a fair data future with agency, accountability, and action as its core features. Agency in data refers to having power to shape personal and/or community data and deciding whether, when, and with whom to share it. Accountability in data means that people have access to mechanisms to shape data governance decisions and to hold the powerful accountable. Data in action refers to the imperative of data producers and decision makers to use and share data to improve lives.

Building on these themes, the Data Values Project will advocate for actions that shift power to the people most affected by data production and use. This paper captures examples and stories that show these actions are already being taken by pro-active governments, companies, and civil society organizations around the world. These examples show what’s possible and already happening, while pointing to the distance that remains to achieve a fair data future for all.

This paper is only the first step to changing power imbalances in data design, collection, use, and governance. A global campaign to advocate for the values laid out in this white paper will launch in September at the United Nations General Assembly. Alongside this global campaign, champions and changemakers will lead localized advocacy efforts by tailoring messages and recommendations for actions at the local, sectoral, and regional levels.

The Data Values Project envisions a world where people can be equal players in the production and use of data that impacts them. This vision is for a fair data future in which the power of data is harnessed and its benefits are shared equitably to improve lives and ensure no one is left behind…(More)”.

Social Noise: What Is It, and Why Should We Care?


Article by Tara Zimmerman: “As social media, online relationships, and perceived social expectations on platforms such as Facebook play a greater role in people’s lives, a new phenomenon has emerged: social noise. Social noise is the influence of personal and relational factors on information received, which can confuse, distort, or even change the intended message. Influenced by social noise, people are likely to moderate their response to information based on cues regarding what behavior is acceptable or desirable within their social network. This may be done consciously or unconsciously as individuals strive to present themselves in ways that increase their social capital. For example, this might be seen as liking or sharing information posted by a friend or family member as a show of support despite having no strong feelings toward the information itself. Similarly, someone might refrain from liking, sharing, or commenting on information they strongly agree with because they believe others in their social network would disapprove.

This study reveals that social media users’ awareness of observation by others does impact their information behavior. Efforts to craft a personal reputation, build or maintain relationships, pursue important commitments, and manage conflict all influence the observable information behavior of
social media users. As a result, observable social media information behavior may not be an accurate reflection of an individual’s true thoughts and beliefs. This is particularly interesting in light of the role social media plays in the spread of mis- and disinformation…(More)”.

Corruption Risk Forecast


About: “Starting with 2015 and building on the work of Alina Mungiu-Pippidi the European Research Centre for Anti-Corruption and State-Building (ERCAS) engaged in the development of a new generation of corruption indicators to fill the gap. This led to the creation of the Index for Public Integrity (IPI) in 2017, of the Corruption Risk Forecast in 2020 and of the T-index (de jure and de facto computer mediated government transparency) in 2021. Also since 2021 a component of the T-index (administrative transparency) is included in the IPI, whose components also offer the basis for the Corruption Risk Forecast.

This generation is different from perception indicators in a few fundamental aspects:

  1. Theory-grounded. Our indicators are unique because they are based on a clear theory- why corruption happens, how do countries that control corruption differ from those that don’t and what specifically is broken and should be fixed. We tested for a large variety of indicators before we decided on these ones.
  2. Specific. Each component is a measurement based on facts of a certain aspect of control of corruption or transparency. Read methodology to follow in detail where the data comes from and how these indicators were selected.
  3. Change sensitive. Except for the T-index components whose monitoring started in 2021 all other components go back in time at least 12 years and can be compared across years in the Trends menu on the Corruption Risk forecast page. No statistical process blurs the difference across years as with perception indicators. For long term trends, we flag what change is significant and what change is not. T-index components will also be comparable across the nest years to come. Furthermore, our indicators are selected to be actionable, so any significant policy intervention which has an impact is captured and reported when we renew the data.
  4. Comparative. You can compare every country we cover with the rest of the world to see exactly where it stands, and against its peers from the region and the income group.
  5. Transparent. Our T-index dataallows you to review and contribute to our work. Use the feedback form on T-index page to send input, and after checking by our team we will upgrade the codes to include your contribution. Use the feedback form on Corruption Risk forecast page to contribute to the forecast…(More)”.

Artificial Intelligence in the City: Building Civic Engagement and Public Trust


Collection of essays edited by Ana Brandusescu, Ana, and Jess Reia: “After navigating various challenging policy and regulatory contexts over the years, in different regions, we joined efforts to create a space that offers possibilities for engagement focused on the expertise, experiences and hopes to shape the future of technology in urban areas. The AI in the City project emerged as an opportunity to connect people, organizations, and resources in the networks we built over the last decade of work on research and advocacy in tech policy. Sharing non-Western and Western perspectives from five continents, the contributors questioned, challenged, and envisioned ways public trust and meaningful civic engagement can flourish and persist as data and AI become increasingly pervasive in our lives. This collection of essays brings together a group of multidisciplinary scholars, activists, and practitioners working on a diverse range of initiatives to map strategies going forward. Divided into five parts, the collection brings into focus: 1) Meaningful engagement and public participation; 2) Addressing inequalities and building trust; 3) Public and private boundaries in tech policy; 4) Legal perspectives and mechanisms for accountability; and 5) New directions for local and urban governance. The focus on civil society and academia was deliberate: a way to listen to and learn with people who have dedicated many years to public interest advocacy, governance and policy that represents the interests of their communities…(More)”.