This article by Tech Policy Press discusses the challenges of defining and mitigating systemic risks under the Digital Services Act (DSA), which targets issues like illegal content, threats to fundamental rights, public security, and wellbeing. Dr. Oliver Marsh from Algorithm Watch explains the difficulties in identifying these risks and the importance of broad definitions to aid research. Key issues include delays in data access and a lack of clear guidelines. Marsh calls for better collaboration between researchers, regulators, and platforms to address these risks effectively. Access the full article below⬇️
Zevo Health’s Post
More Relevant Posts
-
Policy, Ethical Tech + Democracy, FoE, Diversity & Inclusion | Board Member | xTech | xUN | xUSAID | xDiplomat
Published last month, the UN Global Principles for Information Integrity: "The United Nations Global Principles For Information Integrity presents a vision of a future in which power imbalances are redressed so that a small group of actors - including technology companies based in a handful of countries - no longer monopolize control over global information flows. The principles envision an information ecosystem that delivers choice, freedom, privacy and safety for all, in which people everywhere can express themselves freely and make informed and independent decisions. They put forward proposals to empower people all over the world by handing them greater control over the media they choose to consume, their own online experiences, and how their personal data is used. The principles offer support to all those working to share facts in the public interest, as well as the vulnerable or marginalized voices that so often bear the brunt of targeted disinformation and hate campaigns. Calls to action range from the legal obligations of States to the responsibilities of the tech sector to best practices for media and civil society." https://lnkd.in/gzT6ynMj
un-global-principles-for-information-integrity-en.pdf
un.org
To view or add a comment, sign in
-
A recently published article in Internet Research Vol 34 Iss 5, “It pays to be forthcoming: timing of data breach announcement, trust violation, and trust restoration” – by Steven Muzatko and Gaurav Bansal. Please visit https://bit.ly/4fdQaVm to access the article. DOI:10.1108/INTR-12-2021-0939 Internet Research (IntR) is an international and refereed journal that is indexed and abstracted in major databases (e.g., SSCI, SCI, ABI/INFORM Global), with an impact factor of 6.353 in 2021. We are now on Twitter(X)! Please follow us and spread the word about your impactful work: https://lnkd.in/gpwXjgh #internetresearch #research #emerald #trust #data #breach #privacy #concern
To view or add a comment, sign in
-
Online information manipulation and information integrity: An overview of key challenges, actors and the EU's evolving response The global information ecosystem is facing challenges on various levels, necessitating a clear overview of the key issues at stake, the actors involved and possible European Union responses. On a geostrategic level, authoritarian state- and non-state actors, who work to game the open democratic information ecosystems in their favour, have gained the most visibility. At the same time, the tech companies that underpin those open information ecosystems – and that help provide the infrastructure used for information manipulation – are under pressure to take more responsibility. Evolving technologies can exacerbate the risks of information ecosystems working against democracy, rather than for it. Moreover, underlying societal, educational and economic vulnerabilities hamper both individual and collective resilience against information manipulation. The impact on health, societies, economies, democracy, international decision-making, security and human rights has become increasingly visible in recent years. Correspondingly, there is a growing sense of urgency to ensure information integrity, both in the context of elections and beyond. The EU has continued to strengthen its efforts to counter information manipulation and interference, including online disinformation, since 2015. The evolving measures have matured into a growing regulatory framework to address digital information infrastructure vulnerabilities and boost information ecosystems. This, in addition to strengthening societal resilience, involves a high level of cooperation and coordination within and beyond the EU, across all policy areas and with all levels of society. International and multilateral cooperation is therefore key to future-proofing the response.
Online information manipulation and information integrity: An overview of key challenges, actors and the EU's evolving response | Think Tank | European Parliament
europarl.europa.eu
To view or add a comment, sign in
-
Data are at the forefront of efforts to solve many of today's greatest problems. But as data become increasingly voluminous and complex, new techniques and approaches are needed to analyze, interpret, and share data while protecting privacy and minimizing the environmental impact of data storage. Explore insights from the 2023 US-UK Scientific Forum on Researcher Access to Data, which brought together leaders in #DataScience to examine best practices, lessons learned, and new ideas to drive research forward. Read here: https://ow.ly/Rv0l50R46VM The Royal Society #data #research
To view or add a comment, sign in
-
*** 5 Questions for the European Data Protection Summit *** In recent years, crucial issues related to the role of the state have emerged and the importance data plays in this regard. As we celebrate our 20th anniversary, we take the opportunity to discuss the role of a state in times of increasing collection of personal data and the role of data protection in shaping our democratic society. The Summit aims to address fundamental questions: 1️⃣ What is 'data protection' protecting? 2️⃣ Is data protection law suitable for public authorities? 3️⃣ Zooming out onto democracy and the rule of law. How to build a functioning democratic oversight? 4️⃣ In the trap of reactiveness. Can data protection be in the driver’s seat? 5️⃣ Fit for '44. How to turn wishes into proposals? 20 years after the EDPS was created, we invite you to discuss how to bring even more profound progress of individuals' rights in the next 20 years. Discover more https://europa.eu/!hMDKHf & check the programme of the Summit https://t.co/i1cUGH4Ur0
5 Concept Questions for the Summit
20years.edps.europa.eu
To view or add a comment, sign in
-
Recommended Event: Chatham House - "What is the future of cross-border data flows? Navigating long-standing tensions and newfound difficulties for unlocking shared prosperity among modern, digital economies." https://lnkd.in/e6aVA6GQ Research event — 16 September 2024 — 6:00PM TO 7:00PM at Chatham House and Online Speakers - Peter Swire, Audrey Plonk, Norman Barbosa, Emily Taylor Register Here - https://lnkd.in/e8sE36PM Excerpts from the online invitation: * Cross-border data flows can unlock shared prosperity among digital economies, advance international security, and address cybercrime and global crises. * But ensuring the free flow of data across borders involves navigating complex regulatory, security, trust, political, and technical challenges. Developing effective frameworks and agreements to support data flows is a significant undertaking. * Recent bilateral and multilateral agreements and initiatives have advanced data-sharing, respecting the right to privacy and upholding notions of sovereignty. * This has contributed to clearer rules and (potentially) better solutions such as the OECD declaration on government access to data held by companies. * Further progress, supportive of public safety and national security, is on the horizon, like G7 support for data free flow with trust and industry-led, trusted cloud principles on protecting human rights and competitiveness. * More work is needed to operationalize commitments and advance ongoing negotiations, like US–EU negotiations on e-evidence in criminal proceedings. * This is key for ensuring ‘hard’ legal and regulatory mechanisms complement OECD principles. Stakeholders from law enforcement, national security, data protection and industry must confront tensions between sovereign prerogatives and cooperation. * They must also overcome traditional silos between law enforcement and national security work. On the horizon are newfound challenges (for example, in harmonizing legal frameworks and responding to advances in technology). * All the while, stakeholders must work together to promote economic interests, data protection, privacy and cybersecurity. * This expert panel discusses the future of cross-border data-sharing, raising questions including: --What value does cross-border data-sharing bring and where are its current ‘pain points’? --To enable data free flows, how should principles complement ‘hard’ legal and regulatory mechanisms? --Beyond states, law enforcement, major industry players and international organizations, what roles should SMEs, the technical community and civil society stakeholders play in shaping and operationalizing principles? --Looking ahead, where is progress in data-sharing principles and arrangements expected or possible?
What is the future of cross-border data flows?
chathamhouse.org
To view or add a comment, sign in
-
*** 🎬 Now Live: First Episode of Our Mini Video-Series on - The Oral History of Data Protection! *** We are thrilled to release the very first episode of our new video series, a collaboration between #EDPS and Law, Science, Technology & Society (LSTS) Research Group at the Vrije Universiteit Brussel. In this episode, we welcome a distinguished guest, Hon. Michael Kirby, who led the negotiations on the OECD - OCDE Guidelines on the Protection of Privacy and Transborder Flows of Personal Data. 📚 The Guidelines saw the light in 1980, constituting the first ever international instrument on privacy and personal data protection. Our guest, Hon. Michael Kirby from Australia who had the difficult role of achieving convergence despite not fully concordant regional and national perspectives was interviewed by Gloria González Fuster and Lee A Bygrave 💬 . Watch now and stay tuned for more episodes in this exciting series, where we continue to explore the history of data protection and privacy. 📽 https://europa.eu/!JVyyfv Join us as we speak with leading experts who witnessed the evolution of data protection globally first-hand. They will share their unique experiences and perspectives on how data protection policies have developed over the years, the challenges faced, and the breakthroughs that have defined this critical field. #DataProtection #Privacy #OralHistoryOfDataProtection
To view or add a comment, sign in
-
Head of Domain Information Security and Data Protection at DHL Express Germany | Lawyer | CIPP/E | GDDcert.EU | iapp Advisory Board Member
"It is exhausting to have to demand basic security best practices in digitization projects, even though they have long been established." - Prof. Kelber, former Federal Commissioner for Data Protection and Freedom of Information, Germany, in his farewell letter in July 2024. When Prof. Kelber talks about the need for basic methods like encryption, signing, pseudonymization, anonymization, and robust rights and role concepts, he highlights a persistent issue: these fundamental techniques are still not universally implemented, despite being well-established. Despite the availability of advanced Privacy-Enhancing Technologies (PETs), many organizations continue to lag in their implementation. Basic methods such as encryption and anonymization are essential building blocks. They offer a foundation upon which more sophisticated PETs can be built. PETs, including homomorphic encryption and multiparty computing, offer innovative solutions that provide enhanced privacy protections. To effectively implement PETs, a privacy-by-design approach is recommended, integrating data protection safeguards from the outset of system development. This involves mapping legal obligations to design strategies and selecting appropriate technical building blocks. However, challenges remain in bridging the gap between legal frameworks and technological implementation. I recommend Danezis et al. paper from 2014 on this matter. The paper provides a method to map legal privacy obligations to design strategies and technical building blocks for implementing privacy-enhancing technologies. The attached OECD Digital Economy Paper "Emerging privacy-enhancing technologies," published on 8 March 2023, further underscores the importance of PETs in modern data protection strategies. #DataProtection
To view or add a comment, sign in
-
[Retired] Information Specialist & Lecturer & Director IWS News Bureau at ILR School/Cornell University
European Parliament Think Tank (EPTT)--Briefing Online information manipulation and information integrity: An overview of key challenges, actors and the EU's evolving response [30 September 2024] https://lnkd.in/gcA4-7Xj or https://lnkd.in/g3h8qJi6 The global information ecosystem is facing challenges on various levels, necessitating a clear overview of the key issues at stake, the actors involved and possible European Union responses. On a geostrategic level, authoritarian state- and non-state actors, who work to game the open democratic information ecosystems in their favour, have gained the most visibility. At the same time, the tech companies that underpin those open information ecosystems – and that help provide the infrastructure used for information manipulation – are under pressure to take more responsibility. Evolving technologies can exacerbate the risks of information ecosystems working against democracy, rather than for it. Moreover, underlying societal, educational and economic vulnerabilities hamper both individual and collective resilience against information manipulation. The impact on health, societies, economies, democracy, international decision-making, security and human rights has become increasingly visible in recent years. Correspondingly, there is a growing sense of urgency to ensure information integrity, both in the context of elections and beyond. The EU has continued to strengthen its efforts to counter information manipulation and interference, including online disinformation, since 2015. The evolving measures have matured into a growing regulatory framework to address digital information infrastructure vulnerabilities and boost information ecosystems. This, in addition to strengthening societal resilience, involves a high level of cooperation and coordination within and beyond the EU, across all policy areas and with all levels of society. International and multilateral cooperation is therefore key to future-proofing the response.
Online information manipulation and information integrity: An overview of key challenges, actors and the EU's evolving response | Think Tank | European Parliament
europarl.europa.eu
To view or add a comment, sign in
-
How do we gauge what rises to the level of a systemic risk? How do we get the sort of information we need from platforms to identify and mitigate systemic risk, and how do we create the kinds of collaborations between regulators and the research community that are necessary to answer complex questions? Spoke to Dr. Oliver Marsh about AlgorithmWatch's risks repository - and what it tells us about researching systemic risks.
One of the Digital Services Act’s key objectives is to identify and mitigate systemic risks posed by tech platforms. Tech Policy Press fellow Ramsha Jahangir spoke to AlgorithmWatch head of tech research Oliver Marsh, who has been investigating the concept and questions surrounding it. https://lnkd.in/eVX_vJaw
Understanding Systemic Risks under the Digital Services Act | TechPolicy.Press
techpolicy.press
To view or add a comment, sign in
10,393 followers