This special issue examines the policy challenges and government responses to disruptive technologies. It explores the risks, benefits, and trade-offs of deploying disruptive technologies, and examines the efficacy of traditional governance approaches and the need for new regulatory and governance frameworks. Key themes include the need for government stewardship, taking adaptive and proactive approaches, developing comprehensive policies accounting for technical, social, economic, and political dimensions, conducting interdisciplinary research, and addressing data management and privacy challenges. The findings enhance understanding of how governments can navigate the complexities of disruptive technologies and develop policies to maximize benefits and mitigate risks.
Assessing the regulatory challenges of emerging disruptive technologiesAraz Taeihagh
The past decade has witnessed the emergence of many technologies that have the potential to fundamentally alter our economic, social, and indeed personal lives. The problems they pose are in many ways unprecedented, posing serious challenges for policymakers. How should governments respond to the challenges given that the technologies are still evolving with unclear trajectories? Are there general principles that can be developed to design governance arrangements for these technologies? These are questions confronting policymakers around the world and it is the objective of this special issue to offer insights into answering them both in general and with respect to specific emerging disruptive technologies. Our objectives are to help better understand the regulatory challenges posed by disruptive technologies and to develop generalizable propositions for governments' responses to them.
Discussion Questions The difficulty in predicting the future is .docxduketjoy27252
Discussion Questions
: “The difficulty in predicting the future is that the outcomes are unreliable, due to the occurrence of wild-card events that distort the relatively well-understand trends for the near to mid-future.” Offer an example of such a “wild-card” event and some ways in which the security professional might address it in an effective manner. Regarding the need for the security industry as a whole to maintain the professionalism and competencies needed to address emerging threats and hazards, what do you feel are its primary areas of weakness and what proposals could you offer to address them?
The Future of the Security
When considering what awaits the security profession in the years to come and those that will operate within it, developments and forecasts related to security science will in large part be impacted by what has occurred in the past and in present day. What
might
occur, what is most
plausible
and
feasible
given current and expected occurrences, and what has proven to be effective (or not) will all need to be considered in determining those issues that will remain relevant or change. So predicting the future (not in the form of Nostradamus or similar prophets) as it relates to security is a technique that considers probable or desirable outcomes in the face of known or anticipated risks. So given this backdrop, where is security heading?
Physical Security
As long as there are structures that people operate within and house various assets, there will continue to be a need to offer needed protection related to them. All of the topics discussed in this course related to walls, fencing, sensors, alarm systems, guards, locks, and other such issues will be needed in some form or fashion. Whether through manual or technological means, these will remain a constant for the security administrator in providing appropriate defensive measures for the material, tangible assets they oversee. Concerning technology, the same trend will continue in serving as a needed aid in providing security moving forward. Mobile devices of various types, functions, capabilities, and their ability to access data, the ever-increasing use of robotics and the functions they can carry out, sensors that will be able to gain more intelligence regarding detection, and high frequency security cameras that will have the capability to verify the chemical compound of an object at a distance are just some of the many technical innovations on the horizon. Yet, just as technology has taken on a greater role in providing these efforts, so too does technology represent ever-increasing concerns to the security manager.
Cyber Security
As society becomes connected on an ever-increasing basis, attention must be directed towards what implications this environment has related to not only security, but related privacy concerns as well. In
Future Scenarios and Challenges for Security and Privacy
(2016, Williams, Axon, Nurse, & Creese), the researchers took a ver.
This document discusses cybersecurity and provides a framework for governments to develop long-term cybersecurity strategies. It proposes a model with five areas: alignment with social, economic and political factors; development of cybersecurity strategies and policies; protection of critical infrastructure; implementation of national cybersecurity projects and solutions; and stakeholder engagement. The document emphasizes that cybersecurity initiatives must be aligned with a country's legal system and social norms, consider economic impacts, and involve collaboration between government and the private sector to be successful long-term strategies.
Autonomous Vehicles and Embedded Artificial Intelligence The Challenges of F...Meenakshi Munjal
This document discusses the challenges of framing machine driving decisions in autonomous vehicles. It argues that autonomous vehicles have the potential to reduce risks associated with human error, but that they also present new risks due to limitations in artificial intelligence's ability to make morally and ethically complex decisions that humans can make. The document calls for more scrutiny of how autonomous vehicle decision-making capacity is conceptually framed in order to better understand both the risks and benefits of the technology.
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docxbagotjesusa
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INFORMATION SYSTEMS 1
Security and safety of the power grid and its related computer information systems
Name of the student:
Name of the institution:
There have been increased use and application of information and communication technologies in most of critical infrastructures and departments of the government. They have proved to be fundamentally significant in helping the various departments to carry out their daily activities with a lot of ease and proficiency. However, these systems have also opened quite a considerable unforeseen opportunity both positive and negative. The infrastructures have become highly efficient and flexible and this has been very beneficial to the people. On the other hand, there have been persistent problems with cybercrimes and hackers who have outsmarted the government and the set securities protocols every now and then. This has made the state lose billions of dollars in a theft of its secrets and high-level information. In this case, it is right to analyze all the general impacts that can be put in place to prevent cybercrimes as well as threats. It is hence important to validate all the necessary measures that need to be put in place in every organization. The paper will hence give recommendations that can help the named organization solve the issues mentioned.
To address this issue, proper precautions needs to be put in place. The government has to demonstrate preparedness in combating this crime both in terms of systems put in place and also the legal jurisprudence (Higgins, 2016). The US power grid system is an interconnected system that is made up of power generation, transmissions software, and its distribution with a capacity to bring down the whole economy if not well protected. The nation's department of defense (DoD) is one of the most critical and sensitive institutions that can paralyze the state if tampered with by unscrupulous individuals. The situation is even worse if there is an advanced persistent threat (APT) against computers and software that operates the western interconnection power grid. This needs an urgent measure to remove the threat immediately and avoid its reoccurrence. We recommend the following security and safety of the power grid and its related computer information systems are taken by the concerned departments:
a. Creation of a special branch that is specifically dedicated to cyber security
It is high time for the government to come up with a special branch of the military personnel that will be dedicated to fighting cybercrimes (Higgins, 2016). Its main function will be to detect cybercrime activities, to develop mechanisms to prevent cybercrimes, apprehend, arrest and align cyber criminals in a court of law.
b. Creation of special court to determine cybercrime cases
Security and safety of the power grid and its related computer information systems and those crimes associated w.
Technology Giants Control The Global Security.pdfTech Welo
Technology giants wield significant influence over global security through their control of vast amounts of data, communication channels, and digital infrastructure. With their dominance in areas like cloud computing, artificial intelligence, and cybersecurity, these companies shape how nations, organizations, and individuals interact and defend against threats in the digital realm.
Call for papers - ICPP6 T13P05 - PLATFORM GOVERNANCE IN TURBULENT TIMES.docxAraz Taeihagh
CALL FOR PAPERS
T13P05 - PLATFORM GOVERNANCE IN TURBULENT TIMES
https://www.ippapublicpolicy.org/conference/icpp6-toronto-2023/panel-list/17/panel/platform-governance-in-turbulent-times/1428
Abstract submission deadline: 31 January 2023
GENERAL OBJECTIVES, RESEARCH QUESTIONS AND SCIENTIFIC RELEVANCE
Platforms significantly increase the ease of interactions and transactions in our societies. Crowdsourcing and sharing economy platforms, for instance, enable interactions between various groups ranging from casual exchanges among friends and colleagues to the provision of goods, services, and employment opportunities (Taeihagh 2017a). Platforms can also facilitate civic engagements and allow public agencies to derive insights from a critical mass of citizens (Prpić et al. 2015; Taeihagh 2017b). More recently, governments have experimented with blockchain-enabled platforms in areas such as e-voting, digital identity and storing public records (Kshetri and Voas, 2018; Taş & Tanrıöver, 2020; Sullivan and Burger, 2019; Das et al., 2022).
How platforms are implemented and managed can introduce various risks. Platforms can diminish accountability, reduce individual job security, widen the digital divide and inequality, undermine privacy, and be manipulated (Taeihagh 2017a; Loukis et al. 2017; Hautamäki & Oksanen 2018; Ng and Taeihagh 2021). Data collected by platforms, how platforms conduct themselves, and the level of oversight they provide on the activities conducted within them by users, service providers, producers, employers, and advertisers have significant consequences ranging from privacy and ethical concerns to affecting outcomes of elections. Fake news on social media platforms has become a contentious public issue as social media platforms offer third parties various digital tools and strategies that allow them to spread disinformation to achieve self-serving economic and political interests and distort and polarise public opinion (Ng and Taeihagh 2021). The risks and threats of AI-curated and generated content, such as a Generative Pre-Trained Transformer (GPT-3) (Brown et al., 2020) and generative adversarial networks (GANs) are also on the rise (Goodfellow et al., 2014) while there are new emerging risks due to the adoption of blockchain technology such as security vulnerabilities, privacy concerns (Trump et al. 2018; Mattila & Seppälä 2018; Das et al. 2022).
The adoption of platforms was further accelerated by COVID-19, highlighting their governance challenges.
This document proposes guidelines for developing a national cybersecurity strategy. It discusses the importance of cybersecurity given increasing internet usage and mobile broadband adoption. Nations need strategic cybersecurity frameworks to protect digital economies, national security, and citizens from growing cyber threats. The paper reviews existing strategies and highlights challenges. It conducted expert interviews across technical, economic, legal and policy areas to inform proposed guidelines. The goal is to educate on cybersecurity and provide a collaborative framework to mitigate risks in the digital era.
Assessing the regulatory challenges of emerging disruptive technologiesAraz Taeihagh
The past decade has witnessed the emergence of many technologies that have the potential to fundamentally alter our economic, social, and indeed personal lives. The problems they pose are in many ways unprecedented, posing serious challenges for policymakers. How should governments respond to the challenges given that the technologies are still evolving with unclear trajectories? Are there general principles that can be developed to design governance arrangements for these technologies? These are questions confronting policymakers around the world and it is the objective of this special issue to offer insights into answering them both in general and with respect to specific emerging disruptive technologies. Our objectives are to help better understand the regulatory challenges posed by disruptive technologies and to develop generalizable propositions for governments' responses to them.
Discussion Questions The difficulty in predicting the future is .docxduketjoy27252
Discussion Questions
: “The difficulty in predicting the future is that the outcomes are unreliable, due to the occurrence of wild-card events that distort the relatively well-understand trends for the near to mid-future.” Offer an example of such a “wild-card” event and some ways in which the security professional might address it in an effective manner. Regarding the need for the security industry as a whole to maintain the professionalism and competencies needed to address emerging threats and hazards, what do you feel are its primary areas of weakness and what proposals could you offer to address them?
The Future of the Security
When considering what awaits the security profession in the years to come and those that will operate within it, developments and forecasts related to security science will in large part be impacted by what has occurred in the past and in present day. What
might
occur, what is most
plausible
and
feasible
given current and expected occurrences, and what has proven to be effective (or not) will all need to be considered in determining those issues that will remain relevant or change. So predicting the future (not in the form of Nostradamus or similar prophets) as it relates to security is a technique that considers probable or desirable outcomes in the face of known or anticipated risks. So given this backdrop, where is security heading?
Physical Security
As long as there are structures that people operate within and house various assets, there will continue to be a need to offer needed protection related to them. All of the topics discussed in this course related to walls, fencing, sensors, alarm systems, guards, locks, and other such issues will be needed in some form or fashion. Whether through manual or technological means, these will remain a constant for the security administrator in providing appropriate defensive measures for the material, tangible assets they oversee. Concerning technology, the same trend will continue in serving as a needed aid in providing security moving forward. Mobile devices of various types, functions, capabilities, and their ability to access data, the ever-increasing use of robotics and the functions they can carry out, sensors that will be able to gain more intelligence regarding detection, and high frequency security cameras that will have the capability to verify the chemical compound of an object at a distance are just some of the many technical innovations on the horizon. Yet, just as technology has taken on a greater role in providing these efforts, so too does technology represent ever-increasing concerns to the security manager.
Cyber Security
As society becomes connected on an ever-increasing basis, attention must be directed towards what implications this environment has related to not only security, but related privacy concerns as well. In
Future Scenarios and Challenges for Security and Privacy
(2016, Williams, Axon, Nurse, & Creese), the researchers took a ver.
This document discusses cybersecurity and provides a framework for governments to develop long-term cybersecurity strategies. It proposes a model with five areas: alignment with social, economic and political factors; development of cybersecurity strategies and policies; protection of critical infrastructure; implementation of national cybersecurity projects and solutions; and stakeholder engagement. The document emphasizes that cybersecurity initiatives must be aligned with a country's legal system and social norms, consider economic impacts, and involve collaboration between government and the private sector to be successful long-term strategies.
Autonomous Vehicles and Embedded Artificial Intelligence The Challenges of F...Meenakshi Munjal
This document discusses the challenges of framing machine driving decisions in autonomous vehicles. It argues that autonomous vehicles have the potential to reduce risks associated with human error, but that they also present new risks due to limitations in artificial intelligence's ability to make morally and ethically complex decisions that humans can make. The document calls for more scrutiny of how autonomous vehicle decision-making capacity is conceptually framed in order to better understand both the risks and benefits of the technology.
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docxbagotjesusa
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INFORMATION SYSTEMS 1
Security and safety of the power grid and its related computer information systems
Name of the student:
Name of the institution:
There have been increased use and application of information and communication technologies in most of critical infrastructures and departments of the government. They have proved to be fundamentally significant in helping the various departments to carry out their daily activities with a lot of ease and proficiency. However, these systems have also opened quite a considerable unforeseen opportunity both positive and negative. The infrastructures have become highly efficient and flexible and this has been very beneficial to the people. On the other hand, there have been persistent problems with cybercrimes and hackers who have outsmarted the government and the set securities protocols every now and then. This has made the state lose billions of dollars in a theft of its secrets and high-level information. In this case, it is right to analyze all the general impacts that can be put in place to prevent cybercrimes as well as threats. It is hence important to validate all the necessary measures that need to be put in place in every organization. The paper will hence give recommendations that can help the named organization solve the issues mentioned.
To address this issue, proper precautions needs to be put in place. The government has to demonstrate preparedness in combating this crime both in terms of systems put in place and also the legal jurisprudence (Higgins, 2016). The US power grid system is an interconnected system that is made up of power generation, transmissions software, and its distribution with a capacity to bring down the whole economy if not well protected. The nation's department of defense (DoD) is one of the most critical and sensitive institutions that can paralyze the state if tampered with by unscrupulous individuals. The situation is even worse if there is an advanced persistent threat (APT) against computers and software that operates the western interconnection power grid. This needs an urgent measure to remove the threat immediately and avoid its reoccurrence. We recommend the following security and safety of the power grid and its related computer information systems are taken by the concerned departments:
a. Creation of a special branch that is specifically dedicated to cyber security
It is high time for the government to come up with a special branch of the military personnel that will be dedicated to fighting cybercrimes (Higgins, 2016). Its main function will be to detect cybercrime activities, to develop mechanisms to prevent cybercrimes, apprehend, arrest and align cyber criminals in a court of law.
b. Creation of special court to determine cybercrime cases
Security and safety of the power grid and its related computer information systems and those crimes associated w.
Technology Giants Control The Global Security.pdfTech Welo
Technology giants wield significant influence over global security through their control of vast amounts of data, communication channels, and digital infrastructure. With their dominance in areas like cloud computing, artificial intelligence, and cybersecurity, these companies shape how nations, organizations, and individuals interact and defend against threats in the digital realm.
Call for papers - ICPP6 T13P05 - PLATFORM GOVERNANCE IN TURBULENT TIMES.docxAraz Taeihagh
CALL FOR PAPERS
T13P05 - PLATFORM GOVERNANCE IN TURBULENT TIMES
https://www.ippapublicpolicy.org/conference/icpp6-toronto-2023/panel-list/17/panel/platform-governance-in-turbulent-times/1428
Abstract submission deadline: 31 January 2023
GENERAL OBJECTIVES, RESEARCH QUESTIONS AND SCIENTIFIC RELEVANCE
Platforms significantly increase the ease of interactions and transactions in our societies. Crowdsourcing and sharing economy platforms, for instance, enable interactions between various groups ranging from casual exchanges among friends and colleagues to the provision of goods, services, and employment opportunities (Taeihagh 2017a). Platforms can also facilitate civic engagements and allow public agencies to derive insights from a critical mass of citizens (Prpić et al. 2015; Taeihagh 2017b). More recently, governments have experimented with blockchain-enabled platforms in areas such as e-voting, digital identity and storing public records (Kshetri and Voas, 2018; Taş & Tanrıöver, 2020; Sullivan and Burger, 2019; Das et al., 2022).
How platforms are implemented and managed can introduce various risks. Platforms can diminish accountability, reduce individual job security, widen the digital divide and inequality, undermine privacy, and be manipulated (Taeihagh 2017a; Loukis et al. 2017; Hautamäki & Oksanen 2018; Ng and Taeihagh 2021). Data collected by platforms, how platforms conduct themselves, and the level of oversight they provide on the activities conducted within them by users, service providers, producers, employers, and advertisers have significant consequences ranging from privacy and ethical concerns to affecting outcomes of elections. Fake news on social media platforms has become a contentious public issue as social media platforms offer third parties various digital tools and strategies that allow them to spread disinformation to achieve self-serving economic and political interests and distort and polarise public opinion (Ng and Taeihagh 2021). The risks and threats of AI-curated and generated content, such as a Generative Pre-Trained Transformer (GPT-3) (Brown et al., 2020) and generative adversarial networks (GANs) are also on the rise (Goodfellow et al., 2014) while there are new emerging risks due to the adoption of blockchain technology such as security vulnerabilities, privacy concerns (Trump et al. 2018; Mattila & Seppälä 2018; Das et al. 2022).
The adoption of platforms was further accelerated by COVID-19, highlighting their governance challenges.
This document proposes guidelines for developing a national cybersecurity strategy. It discusses the importance of cybersecurity given increasing internet usage and mobile broadband adoption. Nations need strategic cybersecurity frameworks to protect digital economies, national security, and citizens from growing cyber threats. The paper reviews existing strategies and highlights challenges. It conducted expert interviews across technical, economic, legal and policy areas to inform proposed guidelines. The goal is to educate on cybersecurity and provide a collaborative framework to mitigate risks in the digital era.
EXECUTIVE SUMMARY
At the core of the cascading scandals around AI in 2018 are questions of accountability: who is responsible when AI systems harm us? How do we understand these harms, and how do we
remedy them? Where are the points of intervention, and what additional research and regulation is needed to ensure those interventions are effective? Currently there are few answers to these questions, and the frameworks presently governing AI are not capable of ensuring accountability.
As the pervasiveness, complexity, and scale of these systems grow, the lack of meaningful accountability and oversight – including basic safeguards of responsibility, liability, and due
process – is an increasingly urgent concern.
Building on our 2016 and 2017 reports, the AI Now 2018 Report contends with this central problem and addresses the following key issues:
1. The growing accountability gap in AI, which favors those who create and deploy these technologies at the expense of those most affected
2. The use of AI to maximize and amplify surveillance, especially in conjunction with facial and affect recognition, increasing the potential for centralized control and oppression
3. Increasing government use of automated decision systems that directly impact individuals and communities without established accountability structures
4. Unregulated and unmonitored forms of AI experimentation on human populations
5. The limits of technological solutions to problems of fairness, bias, and discrimination
Within each topic, we identify emerging challenges and new research, and provide recommendations regarding AI development, deployment, and regulation. We offer practical
pathways informed by research so that policymakers, the public, and technologists can better understand and mitigate risks. Given that the AI Now Institute’s location and regional expertise is concentrated in the U.S., this report will focus primarily on the U.S. context, which is also where several of the world’s largest AI companies are based.
A Strategy Framework For the Risk Assessment And Mitigation For Large E-Gover...ijmvsc
Globally, e-Government has become an effective tool for civic transformation. In the recent years eGovernment development gained significant momentum despite the financial crisis that crippled the world economy. For most of the governments, the crisis was a wakeup call to become more transparent
and efficient. In addition, there is a growing demand for governments to transform from traditional agency/department centric approach to “Citizen-Centric” approach. This transformation is expected to enhance the quality of life of citizens in terms of greater convenience in availing government services. Eventually this would result in higher levels of citizen satisfaction and improved trust in government.
A Strategy Framework For the Risk Assessment And Mitigation For Large E-Gover...ijmvsc
Globally, e-Government has become an effective tool for civic transformation. In the recent years eGovernment development gained significant momentum despite the financial crisis that crippled the world economy. For most of the governments, the crisis was a wakeup call to become more transparent
and efficient. In addition, there is a growing demand for governments to transform from traditional agency/department centric approach to “Citizen-Centric” approach. This transformation is expected to enhance the quality of life of citizens in terms of greater convenience in availing government services. Eventually this would result in higher levels of citizen satisfaction and improved trust in government
A Strategy Framework For the Risk Assessment And Mitigation For Large E-Gover...ijmvsc
Globally, e-Government has become an effective tool for civic transformation. In the recent years eGovernment development gained significant momentum despite the financial crisis that crippled the world economy. For most of the governments, the crisis was a wakeup call to become more transparent and efficient. In addition, there is a growing demand for governments to transform from traditional agency/department centric approach to “Citizen-Centric” approach. This transformation is expected to enhance the quality of life of citizens in terms of greater convenience in availing government services. Eventually this would result in higher levels of citizen satisfaction and improved trust in government. However, projects of such scale and complexity, faces numerous roadblocks which eventually hamper its potential to deliver the intended benefits to the citizens. The success of these programmes calls for strategic direction, policy making and greater coordination among multiple agencies, following a uniform approach in achieving the vision. This necessitates a strategic framework comprehensive enough to visualize and enable the leaders in addressing the potential roadblocks or resistance. This report presents the outcome of a research to define a strategic framework that models the opposing and propelling forces dormant during a project time. This would help the strategic decision makers to visualize each project as a whole and take quick decisions in the areas that need additional thrust, to ensure that the initiatives achieve the envisaged goals.
Running head: CYBER SECURITY
1
CYBER SECURITY/EMERGENCY MANAGEMENT POLICY
2
The term "Running head" is formatted as Running head:
Cyber Security/Emergency Management Policy
American Public University (EDMG 600)
Dr. Darrell Dantzler
05/09/2018
Cyber Security/Emergency Management Policy
Begin the paper with an introduction of your topic. An introduction has an attention getter, purpose or thesis statement, and an overview. An attention getter can begin with any of the 6 ways: (1) Anecdote, (2) Question, (3) Quotation, (4) Humor, (5) Shocking Statistic, or a (6) combination of them (http://classroom.synonym.com/5-types-attention-getters-essays-2877.html). After you introduce the topic, state the purpose of the paper. The purpose can be as simple as restating the objective of the assignment. The purpose of this paper is to (state purpose). (Overview) The paper will address the following: (List topics)
Part 1
After reading Moore at al. (2010), Goodyear, Portillo, Goerdel & Williams (2010) and Deloitte-NASCIO (2013), develop a cyber security/EM Policy Analytical model in which you will recommend and justify the most effective way to manage emergency management related cyber security issues at the state level.
Cyber Security
Cybercrimes are increasingly becoming more common in all sectors in the world. This has made cyber
security a top agenda for everyone in the world. This has resulted in the conventions and creation of agencies and structures that will facilitate cyber security (Deloitte-NASCIO. 2013, p 16).According to the author, a number of cyber laws have been formulated and more are being formulated to handle this challenge. For this matter, protecting our companies from various incidences of cyber-crimes, we will need to formulate clear and organised policies that will pit every structure in place to check the menace (Deloitte-NASCIO. 2013, p 34).Since internet is a gala for vast information in which everyone and business navigate through, with different intentions, protecting personal and company sensitive information is increasingly becoming a challenge (Moore et al., 2010, p 56). Cyber security policy will try to track the paths of the internet users in order to control their navigation and keep it on the recommended or acceptable tracks. Allowing internet users to deviate from the pre-determined and acceptable paths, as are stipulated in the policy, will lead to discrepancy in the use of information on the internet thus risking accessibility and sharing of sensitive information without permission (illegal). When personalised or sensitive information reached the public pages of the internet, it becomes irretrievable and loses secrecy. This is the major concern of most governments. Hackers have been able to exploit the Operating System (OS) of people’s computers, accessing and leaving the gathered information in the public dom ...
discuss how the types of threats discussed in the article.docxbkbk37
The document discusses cyber threats against critical national infrastructure like pipelines that transport fuel and gas. Such attacks could significantly disrupt the economy by interrupting essential services and causing shortages. Implementing diversity and common practices across organizations could help mitigate these threats by making systems more resilient and better able to share information on threats and solutions. Having diverse teams and recruiting from a variety of backgrounds would also strengthen cybersecurity defenses.
The document discusses information security concerns of industry managers. A survey found that information security is the top concern of managers, even more than risks from the economy or natural disasters. While industries invest heavily in information security, most managers still trust their current security systems despite few having organizations well-adapted to new information risks. The complexity of assessing security risks is growing due to new IT capabilities, critical infrastructure developments, cloud services, and increasing cybercrime. Industries and academics must collaborate further on information security research to address these challenges.
The document discusses information security concerns of industry managers. A survey found that information security is the top concern of managers, even more than risks from the economy or natural disasters. Despite the importance placed on security, most managers still trust their security systems even though few have security practices adapted for current risks. The document also notes that analyzing security risks is increasingly complex due to new technologies, infrastructure developments, cloud services, and cybercrime. Industries and academics must collaborate further on security research to address these challenges.
The rapid developments in Artificial Intelligence (AI) and the intensification in the adoption of AI in domains such as autonomous vehicles, lethal weapon systems, robotics and alike pose serious challenges to governments as they must manage the scale and speed of socio-technical transitions occurring. While there is considerable literature emerging on various aspects of AI, governance of AI is a significantly underdeveloped area. The new applications of AI offer opportunities for increasing economic efficiency and quality of life, but they also generate unexpected and unintended consequences and pose new forms of risks that need to be addressed. To enhance the benefits from AI while minimising the adverse risks, governments worldwide need to understand better the scope and depth of the risks posed and develop regulatory and governance processes and structures to address these challenges. This introductory article unpacks AI and describes why the Governance of AI should be gaining far more attention given the myriad of challenges it presents. It then summarises the special issue articles and highlights their key contributions. This special issue introduces the multifaceted challenges of governance of AI, including emerging governance approaches to AI, policy capacity building, exploring legal and regulatory challenges of AI and Robotics, and outstanding issues and gaps that need attention. The special issue showcases the state-of-the-art in the governance of AI, aiming to enable researchers and practitioners to appreciate the challenges and complexities of AI governance and highlight future avenues for exploration.
Cyber-enabled Information Operations -- Inglis 04 27-17 -- SASCDavid Sweigert
Chris Inglis testified before the Senate Armed Services Committee about cyber-enabled information operations. He discussed three trends exacerbating the impact of technology: 1) a new geography of the internet transcending physical borders, 2) people increasingly organizing by ideology rather than proximity, and 3) private and state actors seeing cyberspace as a venue for collaboration, competition, and conflict. Any solution must address technology, people, and the procedures binding them, and emphasize collaboration between private and public sectors to improve resilience across borders.
REPORT Risk Nexus - Global Cyber Governance: Preparing for New Business Risks ESADE
The process of globalization, the emergence of new powers, and the increasing relevance of non-state actors are creating a multipolar and interconnected world. In the international arena, political and ideological diversity among the most relevant parties, diffusion of power, and the impact of changing global economics have added complexity to the geopolitical landscape. Businesses now operate in a much more difficult, heterogeneous environment.
This publication has been prepared by Zurich Insurance Group Ltd and ESADE.
Section 1: Emerging technologies will fundamentally change the nature of cyber risk.
Section 2: An inadequate global cyber governance framework.
Section 3: Toward a new governance framework: challenges and opportunities.
Risk and Responsibility in a Hyperconnected World assesses cyber resilience and the impact of cyberattacks. It examines necessary action areas, analyzes response readiness through interviews and surveys, and sets out three alternative future scenarios. The report finds that cyberattacks pose strategic risks and could slow innovation worth $1-21 trillion. While large companies acknowledge interdependence, most lack mature cyber risk management processes. The report concludes collaborative action is needed across sectors to build cyber capabilities and develop a framework for participants to enhance resilience. It proposes a 14-point roadmap to facilitate cooperation.
This document discusses balancing the responsibilities of public and private entities in developing intelligent transportation system (ITS) infrastructure. It outlines key considerations for both public sector decision makers seeking to benefit citizens and private businesses aiming to profit. Specifically, the document recommends: (1) engaging public and private stakeholders throughout the process to understand costs, risks, and benefits, (2) combining immediate work with potential for future projects to incentivize private investment, and (3) establishing a symbiotic relationship that maximizes benefits to both public welfare and long-term business opportunities.
This paper presents a project management methodology - developed part of an engineering doctorate research at Warwick University - for managing large scale IT projects with a focus on national ID programmes. The methodology was mainly tested in the United Arab Emirates (UAE) and was followed in three GCC countries. The research demonstrated that by following a formal structured methodology, governments will have better visibility and control over such programmes. The implementation revealed that the phases and processes of the proposed methodology supported the overall management, planning, control over the project activities, promoted effective communication, improved scope and risk management, and ensured quality deliverables.
Project 2020
Scenarios for the Future of Cybercrime -
White Paper for Decision Makers
2
Contents
1. About Project 2020 3
2. Implications for Cybersecurity Stakeholders 3
3. Cybercriminal Threats 6
4. The View from 2012 8
5. Scenario Narratives for 2020 10
a. Citizen - Kinuko 10
b. Business - Xinesys Enterprises and Lakoocha 14
c. Government - South Sylvania 19
6. Beyond 2020 24
Appendix – Scenario Method 25
3
1. About Project 2020
Project 2020 is an initiative of the International Cyber Security
Protection Alliance (ICSPA). Its aim is to anticipate the future of
cybercrime, enabling governments, businesses and citizens to
prepare themselves for the challenges and opportunities of the
coming decade. It comprises a range of activities, including
common threat reporting, scenario exercises, policy guidance and
capacity building.
The scenarios in this document are not predictions of a single
future. Rather, they are descriptions of a possible future, which
focuses on the impact of cybercrime from the perspectives of an
ordinary Internet user, a manufacturer, a communications service
provider and a government. The events and developments
described are designed to be plausible in some parts of the world,
as opposed to inevitable in all. They take their inspiration from
analysis of the current threat landscape, the expert opinion of
ICSPA members and extensive horizon scanning, particularly of
emerging technologies.
The European Cybercrime Centre (EC3) at Europol and the ICSPA
would like to express their heartfelt thanks to the Global Review
Panel of experts from governments, international organisations,
industry and academia who took the time to validate the scenarios.
This document is undoubtedly the better for it.
2. Implications for Cybersecurity Stakeholders
The scenarios presented in Section 5 raise a number of questions to
be answered by today’s stakeholders and decision makers. These
include:
• Who owns the data in networked systems, and for how
long?
• Who will distinguish between data misuse and legitimate
use, and will we achieve consistency? What data will the
authorities be able to access and use for the purposes of
preventing and disrupting criminal activity?
• Who covers (and recovers) the losses, both financial and in
terms of data recovery?
• Who secures the joins between services, applications and
networks? And how can objects that use different technologies
operate safely in the same environment?
4
• Do we want local or global governance and security
solutions?
• Will we be able to transit to new governance and business
models without causing global shocks, schisms and
significant financial damage?
If these questions remain unanswered, or the responses are
uncoordinated, we risk imposing significant barriers to the
technological advantages prom.
2Running head PUBLIC SAFETY ADMINISTRATORS 2PUBLIC SAFETY A.docxBHANU281672
2
Running head: PUBLIC SAFETY ADMINISTRATORS
2
PUBLIC SAFETY ADMINISTRATORS
Public Safety Administrators
Michael Petras
University of Maryland University College
Public safety administration entails the coordination of the resources that would be used in the safety and security of the community. Mainly, public safety administrators include the police officers, the emergency teams, fire departments, and even medical service providers. The main aim or role of the public safety administrators is to ensure that the general public is protected from various threats that may arise as they interact within the environment. However, recently, there have been some challenges that have been an issue in the provision of public safety administrations. The effect of social media use in the public has been a challenge to the public safety administration because of the technicality involved in the use of the same. Therefore, there is a need to understand social media use as a challenge to the public safety administration.
In the use of social media, it is expected that the lawmakers, litigators and even the community members shape the federal, state and local law and departmental policy regarding what information the public safety administrators access when trying to protect individuals from areas such as cybercrime and bullying (Beckett, 2018). The use of social media puts so many individuals at a lot of risks that need protection from public safety administrators. It is as a result of this need to protect the public that laws have been put into place laws on the type of data and transparency required to protect the public. Some of these laws have been a challenge to the security providers and therefore become an issue that needs to be addressed.
The issue of transparency and access to public data from the public using social media came into existence when there was a rise in modern technology. The arrival of the new technology that could enable people to interact online is the one that resulted to lawmakers coming up with policies that would require the public safety administrators become more transparent on the data they access and the extent of the data they access from the public (Namkoong et al., 2017). The policymakers argued that the public safety administrators in their line of duty were accessing private data, which is illegal. They then came up with laws prohibiting the same, and that made it a challenge to protect the public who are on social media platforms.
The history of the issue is dated from the digital age, whereby the users of social media platforms such as Facebook, Twitter, and even Instagram started sharing the geographic location and other data in public. However, watchdog or public safety administrators could use this data to come up with ways to protect the public and ensure public safety. However, some of the ways that the data was being used entailed some discriminatory surveillance and even tended to violate privac.
2Running head PUBLIC SAFETY ADMINISTRATORS 2PUBLIC SAFETY A.docxlorainedeserre
2
Running head: PUBLIC SAFETY ADMINISTRATORS
2
PUBLIC SAFETY ADMINISTRATORS
Public Safety Administrators
Michael Petras
University of Maryland University College
Public safety administration entails the coordination of the resources that would be used in the safety and security of the community. Mainly, public safety administrators include the police officers, the emergency teams, fire departments, and even medical service providers. The main aim or role of the public safety administrators is to ensure that the general public is protected from various threats that may arise as they interact within the environment. However, recently, there have been some challenges that have been an issue in the provision of public safety administrations. The effect of social media use in the public has been a challenge to the public safety administration because of the technicality involved in the use of the same. Therefore, there is a need to understand social media use as a challenge to the public safety administration.
In the use of social media, it is expected that the lawmakers, litigators and even the community members shape the federal, state and local law and departmental policy regarding what information the public safety administrators access when trying to protect individuals from areas such as cybercrime and bullying (Beckett, 2018). The use of social media puts so many individuals at a lot of risks that need protection from public safety administrators. It is as a result of this need to protect the public that laws have been put into place laws on the type of data and transparency required to protect the public. Some of these laws have been a challenge to the security providers and therefore become an issue that needs to be addressed.
The issue of transparency and access to public data from the public using social media came into existence when there was a rise in modern technology. The arrival of the new technology that could enable people to interact online is the one that resulted to lawmakers coming up with policies that would require the public safety administrators become more transparent on the data they access and the extent of the data they access from the public (Namkoong et al., 2017). The policymakers argued that the public safety administrators in their line of duty were accessing private data, which is illegal. They then came up with laws prohibiting the same, and that made it a challenge to protect the public who are on social media platforms.
The history of the issue is dated from the digital age, whereby the users of social media platforms such as Facebook, Twitter, and even Instagram started sharing the geographic location and other data in public. However, watchdog or public safety administrators could use this data to come up with ways to protect the public and ensure public safety. However, some of the ways that the data was being used entailed some discriminatory surveillance and even tended to violate privac ...
Navigating the governance challenges of disruptive technologies insights from...Araz Taeihagh
The proliferation of autonomous systems like unmanned aerial vehicles, autonomous vehicles and AI-powered industrial and social robots can benefit society significantly, but these systems also present significant governance challenges in operational, legal, economic, social, and ethical dimensions. Singapore’s role as a front-runner in the trial of autonomous systems presents an insightful case to study whether the current provisional regulations address the challenges. With multiple stakeholder involvement in setting provisional regulations, government stewardship is essential for coordinating robust regulation and helping to address complex issues such as ethical dilemmas and social connectedness in governing autonomous systems.
Integrating ict in insurance management design & development of an online ins...Alexander Decker
The document summarizes the design and development of an online insurance system for an East Africa insurance company. Key points:
- The system was developed to create awareness about insurance policies and benefits through an online presence, as the existing manual system was ineffective.
- Requirements for the system were determined through qualitative research methods like interviews and document review with insurance providers and clients.
- The system was built using PHP, WAMP, and MySQL. It allows authorized users to access insurance information and claims through a secure web interface.
- After development, the system's perceived usefulness and ease of use were evaluated through a questionnaire, finding it provided important insurance awareness.
Unmasking deepfakes: A systematic review of deepfake detection and generation...Araz Taeihagh
Due to the fast spread of data through digital media, individuals and societies must assess the reliability of information. Deepfakes are not a novel idea but they are now a widespread phenomenon. The impact of deepfakes and disinformation can range from infuriating individuals to affecting and misleading entire societies and even nations. There are several ways to detect and generate deepfakes online. By conducting a systematic literature analysis, in this study we explore automatic key detection and generation methods, frameworks, algorithms, and tools for identifying deepfakes (audio, images, and videos), and how these approaches can be employed within different situations to counter the spread of deepfakes and the generation of disinformation. Moreover, we explore state-of-the-art frameworks related to deepfakes to understand how emerging machine learning and deep learning approaches affect online disinformation. We also highlight practical challenges and trends in implementing policies to counter deepfakes. Finally, we provide policy recommendations based on analyzing how emerging artificial intelligence (AI) techniques can be employed to detect and generate deepfakes online. This study benefits the community and readers by providing a better understanding of recent developments in deepfake detection and generation frameworks. The study also sheds a light on the potential of AI in relation to deepfakes.
A governance perspective on user acceptance of autonomous systems in SingaporeAraz Taeihagh
Autonomous systems that operate without human intervention by utilising artificial intelligence are a significant feature of the fourth industrial revolution. Various autonomous systems, such as driverless cars, unmanned drones and robots, are being tested in ongoing trials and have even been adopted in some countries. While there has been a discussion of the benefits and risks of specific autonomous systems, more needs to be known about user acceptance of these systems. The reactions of the public, especially regarding novel technologies, can help policymakers better understand people's perspectives and needs, and involve them in decision-making for governance and regulation of autonomous systems. This study has examined the factors that influence the acceptance of autonomous systems by the public in Singapore, which is a forerunner in the adoption of autonomous systems. The Unified Technology Adoption and Use Theory (UTAUT) is modified by introducing the role of government and perceived risk in using the systems. Using structural equation modelling to analyse data from an online survey (n = 500) in Singapore, we find that performance expectancy, effort expectancy, social influence, and trust in government to govern autonomous systems significantly and positively impact the behavioural intention to use autonomous systems. Perceived risk has a negative relationship with user acceptance of autonomous systems. This study contributes to the literature by identifying latent variables that affect behavioural intention to use autonomous systems, especially by introducing the factor of trust in government to manage risks from the use of these systems and filling the gap by studying the entire domain of autonomous systems instead of a narrow focus on one application. The findings will enable policymakers to understand the perceptions of the public in regard to adoption and regulation, and designers and manufacturers to improve user experience.
More Related Content
Similar to Addressing Policy Challenges of Disruptive Technologies
EXECUTIVE SUMMARY
At the core of the cascading scandals around AI in 2018 are questions of accountability: who is responsible when AI systems harm us? How do we understand these harms, and how do we
remedy them? Where are the points of intervention, and what additional research and regulation is needed to ensure those interventions are effective? Currently there are few answers to these questions, and the frameworks presently governing AI are not capable of ensuring accountability.
As the pervasiveness, complexity, and scale of these systems grow, the lack of meaningful accountability and oversight – including basic safeguards of responsibility, liability, and due
process – is an increasingly urgent concern.
Building on our 2016 and 2017 reports, the AI Now 2018 Report contends with this central problem and addresses the following key issues:
1. The growing accountability gap in AI, which favors those who create and deploy these technologies at the expense of those most affected
2. The use of AI to maximize and amplify surveillance, especially in conjunction with facial and affect recognition, increasing the potential for centralized control and oppression
3. Increasing government use of automated decision systems that directly impact individuals and communities without established accountability structures
4. Unregulated and unmonitored forms of AI experimentation on human populations
5. The limits of technological solutions to problems of fairness, bias, and discrimination
Within each topic, we identify emerging challenges and new research, and provide recommendations regarding AI development, deployment, and regulation. We offer practical
pathways informed by research so that policymakers, the public, and technologists can better understand and mitigate risks. Given that the AI Now Institute’s location and regional expertise is concentrated in the U.S., this report will focus primarily on the U.S. context, which is also where several of the world’s largest AI companies are based.
A Strategy Framework For the Risk Assessment And Mitigation For Large E-Gover...ijmvsc
Globally, e-Government has become an effective tool for civic transformation. In the recent years eGovernment development gained significant momentum despite the financial crisis that crippled the world economy. For most of the governments, the crisis was a wakeup call to become more transparent
and efficient. In addition, there is a growing demand for governments to transform from traditional agency/department centric approach to “Citizen-Centric” approach. This transformation is expected to enhance the quality of life of citizens in terms of greater convenience in availing government services. Eventually this would result in higher levels of citizen satisfaction and improved trust in government.
A Strategy Framework For the Risk Assessment And Mitigation For Large E-Gover...ijmvsc
Globally, e-Government has become an effective tool for civic transformation. In the recent years eGovernment development gained significant momentum despite the financial crisis that crippled the world economy. For most of the governments, the crisis was a wakeup call to become more transparent
and efficient. In addition, there is a growing demand for governments to transform from traditional agency/department centric approach to “Citizen-Centric” approach. This transformation is expected to enhance the quality of life of citizens in terms of greater convenience in availing government services. Eventually this would result in higher levels of citizen satisfaction and improved trust in government
A Strategy Framework For the Risk Assessment And Mitigation For Large E-Gover...ijmvsc
Globally, e-Government has become an effective tool for civic transformation. In the recent years eGovernment development gained significant momentum despite the financial crisis that crippled the world economy. For most of the governments, the crisis was a wakeup call to become more transparent and efficient. In addition, there is a growing demand for governments to transform from traditional agency/department centric approach to “Citizen-Centric” approach. This transformation is expected to enhance the quality of life of citizens in terms of greater convenience in availing government services. Eventually this would result in higher levels of citizen satisfaction and improved trust in government. However, projects of such scale and complexity, faces numerous roadblocks which eventually hamper its potential to deliver the intended benefits to the citizens. The success of these programmes calls for strategic direction, policy making and greater coordination among multiple agencies, following a uniform approach in achieving the vision. This necessitates a strategic framework comprehensive enough to visualize and enable the leaders in addressing the potential roadblocks or resistance. This report presents the outcome of a research to define a strategic framework that models the opposing and propelling forces dormant during a project time. This would help the strategic decision makers to visualize each project as a whole and take quick decisions in the areas that need additional thrust, to ensure that the initiatives achieve the envisaged goals.
Running head: CYBER SECURITY
1
CYBER SECURITY/EMERGENCY MANAGEMENT POLICY
2
The term "Running head" is formatted as Running head:
Cyber Security/Emergency Management Policy
American Public University (EDMG 600)
Dr. Darrell Dantzler
05/09/2018
Cyber Security/Emergency Management Policy
Begin the paper with an introduction of your topic. An introduction has an attention getter, purpose or thesis statement, and an overview. An attention getter can begin with any of the 6 ways: (1) Anecdote, (2) Question, (3) Quotation, (4) Humor, (5) Shocking Statistic, or a (6) combination of them (http://classroom.synonym.com/5-types-attention-getters-essays-2877.html). After you introduce the topic, state the purpose of the paper. The purpose can be as simple as restating the objective of the assignment. The purpose of this paper is to (state purpose). (Overview) The paper will address the following: (List topics)
Part 1
After reading Moore at al. (2010), Goodyear, Portillo, Goerdel & Williams (2010) and Deloitte-NASCIO (2013), develop a cyber security/EM Policy Analytical model in which you will recommend and justify the most effective way to manage emergency management related cyber security issues at the state level.
Cyber Security
Cybercrimes are increasingly becoming more common in all sectors in the world. This has made cyber
security a top agenda for everyone in the world. This has resulted in the conventions and creation of agencies and structures that will facilitate cyber security (Deloitte-NASCIO. 2013, p 16).According to the author, a number of cyber laws have been formulated and more are being formulated to handle this challenge. For this matter, protecting our companies from various incidences of cyber-crimes, we will need to formulate clear and organised policies that will pit every structure in place to check the menace (Deloitte-NASCIO. 2013, p 34).Since internet is a gala for vast information in which everyone and business navigate through, with different intentions, protecting personal and company sensitive information is increasingly becoming a challenge (Moore et al., 2010, p 56). Cyber security policy will try to track the paths of the internet users in order to control their navigation and keep it on the recommended or acceptable tracks. Allowing internet users to deviate from the pre-determined and acceptable paths, as are stipulated in the policy, will lead to discrepancy in the use of information on the internet thus risking accessibility and sharing of sensitive information without permission (illegal). When personalised or sensitive information reached the public pages of the internet, it becomes irretrievable and loses secrecy. This is the major concern of most governments. Hackers have been able to exploit the Operating System (OS) of people’s computers, accessing and leaving the gathered information in the public dom ...
discuss how the types of threats discussed in the article.docxbkbk37
The document discusses cyber threats against critical national infrastructure like pipelines that transport fuel and gas. Such attacks could significantly disrupt the economy by interrupting essential services and causing shortages. Implementing diversity and common practices across organizations could help mitigate these threats by making systems more resilient and better able to share information on threats and solutions. Having diverse teams and recruiting from a variety of backgrounds would also strengthen cybersecurity defenses.
The document discusses information security concerns of industry managers. A survey found that information security is the top concern of managers, even more than risks from the economy or natural disasters. While industries invest heavily in information security, most managers still trust their current security systems despite few having organizations well-adapted to new information risks. The complexity of assessing security risks is growing due to new IT capabilities, critical infrastructure developments, cloud services, and increasing cybercrime. Industries and academics must collaborate further on information security research to address these challenges.
The document discusses information security concerns of industry managers. A survey found that information security is the top concern of managers, even more than risks from the economy or natural disasters. Despite the importance placed on security, most managers still trust their security systems even though few have security practices adapted for current risks. The document also notes that analyzing security risks is increasingly complex due to new technologies, infrastructure developments, cloud services, and cybercrime. Industries and academics must collaborate further on security research to address these challenges.
The rapid developments in Artificial Intelligence (AI) and the intensification in the adoption of AI in domains such as autonomous vehicles, lethal weapon systems, robotics and alike pose serious challenges to governments as they must manage the scale and speed of socio-technical transitions occurring. While there is considerable literature emerging on various aspects of AI, governance of AI is a significantly underdeveloped area. The new applications of AI offer opportunities for increasing economic efficiency and quality of life, but they also generate unexpected and unintended consequences and pose new forms of risks that need to be addressed. To enhance the benefits from AI while minimising the adverse risks, governments worldwide need to understand better the scope and depth of the risks posed and develop regulatory and governance processes and structures to address these challenges. This introductory article unpacks AI and describes why the Governance of AI should be gaining far more attention given the myriad of challenges it presents. It then summarises the special issue articles and highlights their key contributions. This special issue introduces the multifaceted challenges of governance of AI, including emerging governance approaches to AI, policy capacity building, exploring legal and regulatory challenges of AI and Robotics, and outstanding issues and gaps that need attention. The special issue showcases the state-of-the-art in the governance of AI, aiming to enable researchers and practitioners to appreciate the challenges and complexities of AI governance and highlight future avenues for exploration.
Cyber-enabled Information Operations -- Inglis 04 27-17 -- SASCDavid Sweigert
Chris Inglis testified before the Senate Armed Services Committee about cyber-enabled information operations. He discussed three trends exacerbating the impact of technology: 1) a new geography of the internet transcending physical borders, 2) people increasingly organizing by ideology rather than proximity, and 3) private and state actors seeing cyberspace as a venue for collaboration, competition, and conflict. Any solution must address technology, people, and the procedures binding them, and emphasize collaboration between private and public sectors to improve resilience across borders.
REPORT Risk Nexus - Global Cyber Governance: Preparing for New Business Risks ESADE
The process of globalization, the emergence of new powers, and the increasing relevance of non-state actors are creating a multipolar and interconnected world. In the international arena, political and ideological diversity among the most relevant parties, diffusion of power, and the impact of changing global economics have added complexity to the geopolitical landscape. Businesses now operate in a much more difficult, heterogeneous environment.
This publication has been prepared by Zurich Insurance Group Ltd and ESADE.
Section 1: Emerging technologies will fundamentally change the nature of cyber risk.
Section 2: An inadequate global cyber governance framework.
Section 3: Toward a new governance framework: challenges and opportunities.
Risk and Responsibility in a Hyperconnected World assesses cyber resilience and the impact of cyberattacks. It examines necessary action areas, analyzes response readiness through interviews and surveys, and sets out three alternative future scenarios. The report finds that cyberattacks pose strategic risks and could slow innovation worth $1-21 trillion. While large companies acknowledge interdependence, most lack mature cyber risk management processes. The report concludes collaborative action is needed across sectors to build cyber capabilities and develop a framework for participants to enhance resilience. It proposes a 14-point roadmap to facilitate cooperation.
This document discusses balancing the responsibilities of public and private entities in developing intelligent transportation system (ITS) infrastructure. It outlines key considerations for both public sector decision makers seeking to benefit citizens and private businesses aiming to profit. Specifically, the document recommends: (1) engaging public and private stakeholders throughout the process to understand costs, risks, and benefits, (2) combining immediate work with potential for future projects to incentivize private investment, and (3) establishing a symbiotic relationship that maximizes benefits to both public welfare and long-term business opportunities.
This paper presents a project management methodology - developed part of an engineering doctorate research at Warwick University - for managing large scale IT projects with a focus on national ID programmes. The methodology was mainly tested in the United Arab Emirates (UAE) and was followed in three GCC countries. The research demonstrated that by following a formal structured methodology, governments will have better visibility and control over such programmes. The implementation revealed that the phases and processes of the proposed methodology supported the overall management, planning, control over the project activities, promoted effective communication, improved scope and risk management, and ensured quality deliverables.
Project 2020
Scenarios for the Future of Cybercrime -
White Paper for Decision Makers
2
Contents
1. About Project 2020 3
2. Implications for Cybersecurity Stakeholders 3
3. Cybercriminal Threats 6
4. The View from 2012 8
5. Scenario Narratives for 2020 10
a. Citizen - Kinuko 10
b. Business - Xinesys Enterprises and Lakoocha 14
c. Government - South Sylvania 19
6. Beyond 2020 24
Appendix – Scenario Method 25
3
1. About Project 2020
Project 2020 is an initiative of the International Cyber Security
Protection Alliance (ICSPA). Its aim is to anticipate the future of
cybercrime, enabling governments, businesses and citizens to
prepare themselves for the challenges and opportunities of the
coming decade. It comprises a range of activities, including
common threat reporting, scenario exercises, policy guidance and
capacity building.
The scenarios in this document are not predictions of a single
future. Rather, they are descriptions of a possible future, which
focuses on the impact of cybercrime from the perspectives of an
ordinary Internet user, a manufacturer, a communications service
provider and a government. The events and developments
described are designed to be plausible in some parts of the world,
as opposed to inevitable in all. They take their inspiration from
analysis of the current threat landscape, the expert opinion of
ICSPA members and extensive horizon scanning, particularly of
emerging technologies.
The European Cybercrime Centre (EC3) at Europol and the ICSPA
would like to express their heartfelt thanks to the Global Review
Panel of experts from governments, international organisations,
industry and academia who took the time to validate the scenarios.
This document is undoubtedly the better for it.
2. Implications for Cybersecurity Stakeholders
The scenarios presented in Section 5 raise a number of questions to
be answered by today’s stakeholders and decision makers. These
include:
• Who owns the data in networked systems, and for how
long?
• Who will distinguish between data misuse and legitimate
use, and will we achieve consistency? What data will the
authorities be able to access and use for the purposes of
preventing and disrupting criminal activity?
• Who covers (and recovers) the losses, both financial and in
terms of data recovery?
• Who secures the joins between services, applications and
networks? And how can objects that use different technologies
operate safely in the same environment?
4
• Do we want local or global governance and security
solutions?
• Will we be able to transit to new governance and business
models without causing global shocks, schisms and
significant financial damage?
If these questions remain unanswered, or the responses are
uncoordinated, we risk imposing significant barriers to the
technological advantages prom.
2Running head PUBLIC SAFETY ADMINISTRATORS 2PUBLIC SAFETY A.docxBHANU281672
2
Running head: PUBLIC SAFETY ADMINISTRATORS
2
PUBLIC SAFETY ADMINISTRATORS
Public Safety Administrators
Michael Petras
University of Maryland University College
Public safety administration entails the coordination of the resources that would be used in the safety and security of the community. Mainly, public safety administrators include the police officers, the emergency teams, fire departments, and even medical service providers. The main aim or role of the public safety administrators is to ensure that the general public is protected from various threats that may arise as they interact within the environment. However, recently, there have been some challenges that have been an issue in the provision of public safety administrations. The effect of social media use in the public has been a challenge to the public safety administration because of the technicality involved in the use of the same. Therefore, there is a need to understand social media use as a challenge to the public safety administration.
In the use of social media, it is expected that the lawmakers, litigators and even the community members shape the federal, state and local law and departmental policy regarding what information the public safety administrators access when trying to protect individuals from areas such as cybercrime and bullying (Beckett, 2018). The use of social media puts so many individuals at a lot of risks that need protection from public safety administrators. It is as a result of this need to protect the public that laws have been put into place laws on the type of data and transparency required to protect the public. Some of these laws have been a challenge to the security providers and therefore become an issue that needs to be addressed.
The issue of transparency and access to public data from the public using social media came into existence when there was a rise in modern technology. The arrival of the new technology that could enable people to interact online is the one that resulted to lawmakers coming up with policies that would require the public safety administrators become more transparent on the data they access and the extent of the data they access from the public (Namkoong et al., 2017). The policymakers argued that the public safety administrators in their line of duty were accessing private data, which is illegal. They then came up with laws prohibiting the same, and that made it a challenge to protect the public who are on social media platforms.
The history of the issue is dated from the digital age, whereby the users of social media platforms such as Facebook, Twitter, and even Instagram started sharing the geographic location and other data in public. However, watchdog or public safety administrators could use this data to come up with ways to protect the public and ensure public safety. However, some of the ways that the data was being used entailed some discriminatory surveillance and even tended to violate privac.
2Running head PUBLIC SAFETY ADMINISTRATORS 2PUBLIC SAFETY A.docxlorainedeserre
2
Running head: PUBLIC SAFETY ADMINISTRATORS
2
PUBLIC SAFETY ADMINISTRATORS
Public Safety Administrators
Michael Petras
University of Maryland University College
Public safety administration entails the coordination of the resources that would be used in the safety and security of the community. Mainly, public safety administrators include the police officers, the emergency teams, fire departments, and even medical service providers. The main aim or role of the public safety administrators is to ensure that the general public is protected from various threats that may arise as they interact within the environment. However, recently, there have been some challenges that have been an issue in the provision of public safety administrations. The effect of social media use in the public has been a challenge to the public safety administration because of the technicality involved in the use of the same. Therefore, there is a need to understand social media use as a challenge to the public safety administration.
In the use of social media, it is expected that the lawmakers, litigators and even the community members shape the federal, state and local law and departmental policy regarding what information the public safety administrators access when trying to protect individuals from areas such as cybercrime and bullying (Beckett, 2018). The use of social media puts so many individuals at a lot of risks that need protection from public safety administrators. It is as a result of this need to protect the public that laws have been put into place laws on the type of data and transparency required to protect the public. Some of these laws have been a challenge to the security providers and therefore become an issue that needs to be addressed.
The issue of transparency and access to public data from the public using social media came into existence when there was a rise in modern technology. The arrival of the new technology that could enable people to interact online is the one that resulted to lawmakers coming up with policies that would require the public safety administrators become more transparent on the data they access and the extent of the data they access from the public (Namkoong et al., 2017). The policymakers argued that the public safety administrators in their line of duty were accessing private data, which is illegal. They then came up with laws prohibiting the same, and that made it a challenge to protect the public who are on social media platforms.
The history of the issue is dated from the digital age, whereby the users of social media platforms such as Facebook, Twitter, and even Instagram started sharing the geographic location and other data in public. However, watchdog or public safety administrators could use this data to come up with ways to protect the public and ensure public safety. However, some of the ways that the data was being used entailed some discriminatory surveillance and even tended to violate privac ...
Navigating the governance challenges of disruptive technologies insights from...Araz Taeihagh
The proliferation of autonomous systems like unmanned aerial vehicles, autonomous vehicles and AI-powered industrial and social robots can benefit society significantly, but these systems also present significant governance challenges in operational, legal, economic, social, and ethical dimensions. Singapore’s role as a front-runner in the trial of autonomous systems presents an insightful case to study whether the current provisional regulations address the challenges. With multiple stakeholder involvement in setting provisional regulations, government stewardship is essential for coordinating robust regulation and helping to address complex issues such as ethical dilemmas and social connectedness in governing autonomous systems.
Integrating ict in insurance management design & development of an online ins...Alexander Decker
The document summarizes the design and development of an online insurance system for an East Africa insurance company. Key points:
- The system was developed to create awareness about insurance policies and benefits through an online presence, as the existing manual system was ineffective.
- Requirements for the system were determined through qualitative research methods like interviews and document review with insurance providers and clients.
- The system was built using PHP, WAMP, and MySQL. It allows authorized users to access insurance information and claims through a secure web interface.
- After development, the system's perceived usefulness and ease of use were evaluated through a questionnaire, finding it provided important insurance awareness.
Similar to Addressing Policy Challenges of Disruptive Technologies (20)
Unmasking deepfakes: A systematic review of deepfake detection and generation...Araz Taeihagh
Due to the fast spread of data through digital media, individuals and societies must assess the reliability of information. Deepfakes are not a novel idea but they are now a widespread phenomenon. The impact of deepfakes and disinformation can range from infuriating individuals to affecting and misleading entire societies and even nations. There are several ways to detect and generate deepfakes online. By conducting a systematic literature analysis, in this study we explore automatic key detection and generation methods, frameworks, algorithms, and tools for identifying deepfakes (audio, images, and videos), and how these approaches can be employed within different situations to counter the spread of deepfakes and the generation of disinformation. Moreover, we explore state-of-the-art frameworks related to deepfakes to understand how emerging machine learning and deep learning approaches affect online disinformation. We also highlight practical challenges and trends in implementing policies to counter deepfakes. Finally, we provide policy recommendations based on analyzing how emerging artificial intelligence (AI) techniques can be employed to detect and generate deepfakes online. This study benefits the community and readers by providing a better understanding of recent developments in deepfake detection and generation frameworks. The study also sheds a light on the potential of AI in relation to deepfakes.
A governance perspective on user acceptance of autonomous systems in SingaporeAraz Taeihagh
Autonomous systems that operate without human intervention by utilising artificial intelligence are a significant feature of the fourth industrial revolution. Various autonomous systems, such as driverless cars, unmanned drones and robots, are being tested in ongoing trials and have even been adopted in some countries. While there has been a discussion of the benefits and risks of specific autonomous systems, more needs to be known about user acceptance of these systems. The reactions of the public, especially regarding novel technologies, can help policymakers better understand people's perspectives and needs, and involve them in decision-making for governance and regulation of autonomous systems. This study has examined the factors that influence the acceptance of autonomous systems by the public in Singapore, which is a forerunner in the adoption of autonomous systems. The Unified Technology Adoption and Use Theory (UTAUT) is modified by introducing the role of government and perceived risk in using the systems. Using structural equation modelling to analyse data from an online survey (n = 500) in Singapore, we find that performance expectancy, effort expectancy, social influence, and trust in government to govern autonomous systems significantly and positively impact the behavioural intention to use autonomous systems. Perceived risk has a negative relationship with user acceptance of autonomous systems. This study contributes to the literature by identifying latent variables that affect behavioural intention to use autonomous systems, especially by introducing the factor of trust in government to manage risks from the use of these systems and filling the gap by studying the entire domain of autonomous systems instead of a narrow focus on one application. The findings will enable policymakers to understand the perceptions of the public in regard to adoption and regulation, and designers and manufacturers to improve user experience.
The soft underbelly of complexity science adoption in policymakingAraz Taeihagh
The deepening integration of social-technical systems creates immensely complex environments, creating increasingly uncertain and unpredictable circumstances. Given this context, policymakers have been encouraged to draw on complexity science-informed approaches in policymaking to help grapple with and manage the mounting complexity of the world. For nearly eighty years, complexity-informed approaches have been promising to change how our complex systems are understood and managed, ultimately assisting in better policymaking. Despite the potential of complexity science, in practice, its use often remains limited to a few specialised domains and has not become part and parcel of the mainstream policy debate. To understand why this might be the case, we question why complexity science remains nascent and not integrated into the core of policymaking. Specifically, we ask what the non-technical challenges and barriers are preventing the adoption of complexity science into policymaking. To address this question, we conducted an extensive literature review. We collected the scattered fragments of text that discussed the non-technical challenges related to the use of complexity science in policymaking and stitched these fragments into a structured framework by synthesising our findings. Our framework consists of three thematic groupings of the non-technical challenges: (a) management, cost, and adoption challenges; (b) limited trust, communication, and acceptance; and (c) ethical barriers. For each broad challenge identified, we propose a mitigation strategy to facilitate the adoption of complexity science into policymaking. We conclude with a call for action to integrate complexity science into policymaking further.
Development of New Generation of Artificial Intelligence in ChinaAraz Taeihagh
How did China become one of the leaders in AI development, and will China prevail in the ongoing AI race with the US? Existing studies have focused on the Chinese central government’s role in promoting AI. Notwithstanding the importance of the central government, a significant portion of the responsibility for AI development falls on local governments’ shoulders. Local governments have diverging interests, capacities and, therefore, approaches to promoting AI. This poses an important question: How do local governments respond to the central government’s policies on emerging technologies, such as AI? This article answers this question by examining the convergence or divergence of central and local priorities related to AI development by analysing the central and local AI policy documents and the provincial variations by focusing on the diffusion of the New Generation Artificial Intelligence Development Plan (NGAIDP) in China. Using a unique dataset of China’s provincial AI-related policies that cite the NGAIDP, the nature of diffusion of the NGAIDP is examined by conducting content analysis and fuzzy-set Qualitative Comparative Analysis (fsQCA). This study highlights the important role of local governments in China’s AI development and emphasises examining policy diffusion as a political process.
Governing disruptive technologies for inclusive development in citiesAraz Taeihagh
Abstract
Cities are increasingly adopting advanced technologies to address complex challenges. Applying technologies such as information and communication technology, artificial intelligence, big data analytics, and autonomous systems in cities' design, planning, and management can cause disruptive changes in their social, economic, and environmental composition. Through a systematic literature review, this research develops a conceptual model linking (1) the dominant city labels relating to tech-driven urban development, (2) the characteristics and applications of disruptive technologies, and (3) the current understanding of inclusive urban development. We extend the discussion by identifying and incorporating the motivations behind adopting disruptive technologies and the challenges they present to inclusive development. We find that inclusive development in tech-driven cities can be realised if governments develop suitable adaptive regulatory frameworks for involving technology companies, build policy capacity, and adopt more adaptive models of governance. We also stress the importance of acknowledging the influence of digital literacy and smart citizenship, and exploring other dimensions of inclusivity, for governing disruptive technologies in inclusive smart cities.
Why and how is the power of big teach increasing?Araz Taeihagh
Abstract: The growing digitalization of our society has led to a meteoric rise of large technology companies (Big Tech), which have amassed tremendous wealth and influence through their ownership of digital infrastructure and platforms. The recent launch of ChatGPT and the rapid popularization of generative artificial intelligence (GenAI) act as a focusing event to further accelerate the concentration of power in the hands of the Big Tech. By using Kingdon’s multiple streams framework, this article investigates how Big Tech utilize their technological monopoly and political influence to reshape the policy landscape and establish themselves as key actors in the policy process. It explores the implications of the rise of Big Tech for policy theory in two ways. First, it develops the Big Tech-centric technology stream, highlighting the differing motivations and activities from the traditional innovation-centric technology stream. Second, it underscores the universality of Big Tech exerting ubiquitous influence within and across streams, to primarily serve their self-interests rather than promote innovation. Our findings emphasize the need for a more critical exploration of policy role of Big Tech to ensure balanced and effective policy outcomes in the age of AI.
Keywords: generative AI, governance, artificial intelligence, big tech, multiple streams framework
Sustainable energy adoption in poor rural areasAraz Taeihagh
Abstract
A growing body of literature recognises the role of local participation by end users in the successful implementation of sustainable development projects. Such community-based initiatives are widely assumed to be beneficial in providing additional savings, increasing knowledge and skills, and improving social cohesion. However, there is a lack of empirical evidence regarding the success (or failure) of such projects, as well as a lack of formal impact assessment methodologies that can be used to assess their effectiveness in meeting the needs of communities. Using a case study approach, we investigate the effectiveness of community-based energy projects in regard to achieving long-term renewable energy technology (RET) adoption in energy-poor island communities in the Philippines. This paper provides an alternative analytical framework for assessing the impact of community-based energy projects by defining RET adoption as a continuous and relational process that co-evolves and co-produces over time, highlighting the role of social capital in the long-term RET adoption process. In addition, by using the Social Impact Assessment methodology, we study off-grid, disaster-vulnerable and energy-poor communities in the Philippines and we assess community renewable energy (RE) projects implemented in those communities. We analyse the nature of participation in the RET adoption process, the social relations and interactions formed between and among the different stakeholders, and the characteristics, patterns and challenges of the adoption process.
Highlights
• Community-based approaches aid state-led renewable energy in off-grid areas.
• Social capital in communities addresses immediate energy needs in affected areas.
• Change Mapping in Social Impact Assessment shows community-based RE project impacts.
• Long-term renewable energy adoption involves co-evolving hardware, software, orgware.
• Successful adoption relies on communal mechanisms to sustain renewable energy systems.
Smart cities as spatial manifestations of 21st century capitalismAraz Taeihagh
Globally, smart cities attract billions of dollars in investment annually, with related market opportunities forecast to grow year-on-year. The enormous resources poured into their development consist of financial capital, but also natural, human and social resources converted into infrastructure and real estate. The latter act as physical capital storage and sites for the creation of digital products and services expected to generate the highest value added. Smart cities serve as temporary spatial fixes until new and better investments opportunities emerge. Drawing from a comprehensive range of publications on capitalism, this article analyzes smart city developments as typifier of 21st century capital accumulation where the financialization of various capitals is the overarching driver and ecological overshoot and socio-economic undershoot are the main negative consequences. It closely examines six spatial manifestations of the smart city – science parks and smart campuses; innovation districts; smart neighborhoods; city-wide and city-regional smart initiatives; urban platforms; and alternative smart city spaces – as receptacles for the conversion of various capitals. It also considers the influence of different national regimes and institutional contexts on smart city developments. This is used, in the final part, to open a discussion about opportunities to temper the excesses of 21st century capitalism.
Highlights
• Recent academic literature on modern capitalism and smart city development are brought together
• Different interpretations and denominations of 21th century capitalism are mapped and synthesized into an overview box
• Six spatial manifestations of the smart city are identified and thoroughly described, with their major institutions, actors and resources
• Five different types of capital (natural, human, social, physical and financial) are mapped, along with an analysis of how further financialization affects conversion processes between them
• Options to mitigate exclusionary tendencies of capitalism in the digital age are explored, based on the varieties of capitalism literature
Digital Ethics for Biometric Applications in a Smart CityAraz Taeihagh
From border control using fingerprints to law enforcement with video surveillance to self-activating devices via voice identification, biometric data is used in many applications in the contemporary context of a Smart City. Biometric data consists of human characteristics that can identify one person from others. Given the advent of big data and the ability to collect large amounts of data about people, data sources ranging from fingerprints to typing patterns can build an identifying profile of a person. In this article, we examine different types of biometric data used in a smart city based on a framework that differentiates between profile initialization and identification processes. Then, we discuss digital ethics within the usage of biometric data along the lines of data permissibility and renewability. Finally, we provide suggestions for improving biometric data collection and processing in the modern smart city.
A realist synthesis to develop an explanatory model of how policy instruments...Araz Taeihagh
Abstract
Background
Child and maternal health, a key marker of overall health system performance, is a policy priority area by the World Health Organization and the United Nations, including the Sustainable Development Goals. Previous realist work has linked child and maternal health outcomes to globalization, political tradition, and the welfare state. It is important to explore the role of other key policy-related factors. This paper presents a realist synthesis, categorising policy instruments according to the established NATO model, to develop an explanatory model of how policy instruments impact child and maternal health outcomes.
Methods
A systematic literature search was conducted to identify studies assessing the relationships between policy instruments and child and maternal health outcomes. Data were analysed using a realist framework. The first stage of the realist analysis process was to generate micro-theoretical initial programme theories for use in the theory adjudication process. Proposed theories were then adjudicated iteratively to produce a set of final programme theories.
Findings
From a total of 43,415 unique records, 632 records proceeded to full-text screening and 138 papers were included in the review. Evidence from 132 studies was available to address this research question. Studies were published from 1995 to 2021; 76% assessed a single country, and 81% analysed data at the ecological level. Eighty-eight initial candidate programme theories were generated. Following theory adjudication, five final programme theories were supported. According to the NATO model, these were related to treasure, organisation, authority-treasure, and treasure-organisation instrument types.
Conclusions
This paper presents a realist synthesis to develop an explanatory model of how policy instruments impact child and maternal health outcomes from a large, systematically identified international body of evidence. Five final programme theories were supported, showing how policy instruments play an important yet context-dependent role in influencing child and maternal health outcomes.
A scoping review of the impacts of COVID-19 physical distancing measures on v...Araz Taeihagh
Most governments have enacted physical or social distancing measures to control COVID-19 transmission. Yet little is known about the socio-economic trade-offs of these measures, especially for vulnerable populations, who are exposed to increased risks and are susceptible to adverse health outcomes. To examine the impacts of physical distancing measures on the most vulnerable in society, this scoping review screened 39,816 records and synthesised results from 265 studies worldwide documenting the negative impacts of physical distancing on older people, children/students, low-income populations, migrant workers, people in prison, people with disabilities, sex workers, victims of domestic violence, refugees, ethnic minorities, and people from sexual and gender minorities. We show that prolonged loneliness, mental distress, unemployment, income loss, food insecurity, widened inequality and disruption of access to social support and health services were unintended consequences of physical distancing that impacted these vulnerable groups and highlight that physical distancing measures exacerbated the vulnerabilities of different vulnerable populations.
Data Sharing in Disruptive Technologies Lessons from Adoption of Autonomous S...Araz Taeihagh
Autonomous systems have been a key segment of disruptive technologies for which data are constantly collected, processed, and shared to enable their operations. The internet of things facilitates the storage and transmission of data and data sharing is vital to power their development. However, privacy, cybersecurity, and trust issues have ramifications that form distinct and unforeseen barriers to sharing data. This paper identifies six types of barriers to data sharing (technical, motivational, economic, political, legal, and ethical), examines strategies to overcome these barriers in different autonomous systems, and proposes recommendations to address them. We traced the steps the Singapore government has taken through regulations and frameworks for autonomous systems to overcome barriers to data sharing. The results suggest specific strategies for autonomous systems as well as generic strategies that apply to a broader set of disruptive technologies. To address technical barriers, data sharing within regulatory sandboxes should be promoted. Promoting public-private collaborations will help in overcoming motivational barriers. Resources and analytical capacity must be ramped up to overcome economic barriers. Advancing comprehensive data sharing guidelines and discretionary privacy laws will help overcome political and legal barriers. Further, enforcement of ethical analysis is necessary for overcoming ethical barriers in data sharing. Insights gained from this study will have implications for other jurisdictions keen to maximize data sharing to increase the potential of disruptive technologies such as autonomous systems in solving urban problems.
Call for papers - ICPP6 T13P03 - GOVERNANCE AND POLICY DESIGN LESSONS FOR TRU...Araz Taeihagh
CALL FOR PAPERS
T13P03 - GOVERNANCE AND POLICY DESIGN LESSONS FOR TRUST BUILDING AND RESPONSIBLE USE OF AI, AUTONOMOUS SYSTEMS AND ROBOTICS
https://www.ippapublicpolicy.org/conference/icpp6-toronto-2023/panel-list/17/panel/governance-and-policy-design-lessons-for-trust-building-and-responsible-use-of-ai-autonomous-systems-and-robotics/1390
Abstract submission deadline: 31 January 2023
GENERAL OBJECTIVES, RESEARCH QUESTIONS AND SCIENTIFIC RELEVANCE
Artificial intelligence (AI), Autonomous Systems (AS) and Robotics are key features of the fourth industrial revolution, and their applications are supposed to add $15 trillion to the global economy by 2030 and improve the efficiency and quality of public service delivery (Miller & Sterling, 2019). A McKinsey global survey found that over half of the organisations surveyed use AI in at least one function (McKinsey, 2020). The societal benefits of AI, AS, and Robotics have been widely acknowledged (Buchanan 2005; Taeihagh & Lim 2019; Ramchurn et al. 2012), and the acceleration of their deployment is a disruptive change impacting jobs, the economic and military power of countries, and wealth concentration in the hands of corporations (Pettigrew et al., 2018; Perry & Uuk, 2019).
However, the rapid adoption of these technologies threatens to outpace the regulatory responses of governments around the world, which must grapple with the increasing magnitude and speed of these transformations (Taeihagh 2021). Furthermore, concerns about these systems' deployment risks and unintended consequences are significant for citizens and policymakers. Potential risks include malfunctioning, malicious attacks, and objective mismatch due to software or hardware failures (Page et al., 2018; Lim and Taeihagh, 2019; Tan et al., 2022). There are also safety, liability, privacy, cybersecurity, and industry risks that are difficult to address (Taeihagh & Lim, 2019) and The opacity in AI operations has also manifested in potential bias against certain groups of individuals that lead to unfair outcomes (Lim and Taeihagh 2019; Chesterman, 2021).
These risks require appropriate governance mechanisms to be mitigated, and traditional policy instruments may be ineffective due to insufficient information on industry developments, technological and regulatory uncertainties, coordination challenges between multiple regulatory bodies and the opacity of the underlying technology (Scherer 2016; Guihot et al. 2017; Taeihagh et al. 2021), which necessitate the use of more nuanced approaches to govern these systems. Subsequently, the demand for the governance of these systems has been increasing (Danks & London, 2017; Taeihagh, 2021).
Call for papers - ICPP6 T07P01 - EXPLORING TECHNOLOGIES FOR POLICY ADVICE.docxAraz Taeihagh
CALL FOR PAPERS
T07P01 - EXPLORING TECHNOLOGIES FOR POLICY ADVICE
https://www.ippapublicpolicy.org/conference/icpp6-toronto-2023/panel-list/17/panel/exploring-technologies-for-policy-advice/1295
Abstract submission deadline: 31 January 2023
GENERAL OBJECTIVES, RESEARCH QUESTIONS AND SCIENTIFIC RELEVANCE
Knowledge and expertise are key components of policy-making and policy design, and many institutions and processes exist – universities, professional policy analysts, think tanks, policy labs, etc. – to generate and mobilize knowledge for effective policies and policy-making. Despite many years of research, however. many critical ssues remain unexplored, including the nature of knowledge and non-knowledge, how policy advice is organized into advisory systems or regimes, and when and how specific types of knowledge or evidence are transmitted and influence policy development and implementation. These long-standing issues have been joined recently by use of Artificial Intelligence and Big data, and other kinds of technological developments – such as crowdsourcing through open collaboration platforms, virtual labour markets, and tournaments – which hold out the promise of automating, enhancing. or expanding policy advisory activities in government. This panel seeks to explore all aspects of the application of current and future technologies to policy advice, including case studies of its deployment as well as theoretical and conceptual studies dealing with moral, epistemological and other issues surrounding its use.
What factors drive policy transfer in smart city developmentAraz Taeihagh
Abstract
Smart city initiatives are viewed as an input to existing urban systems to solve various problems faced by modern cities. Making cities smarter implies not only technological innovation and deployment, but also having smart people and effective policies. Cities can acquire knowledge and incorporate governance lessons from other jurisdictions to develop smart city initiatives that are unique to the local contexts. We conducted two rounds of surveys involving 23 experts on an e-Delphi platform to consolidate their opinion on factors that facilitate policy transfer among smart cities. Findings show a consensus on the importance of six factors: having a policy entrepreneur; financial instruments; cities’ enthusiasm for policy learning; capacity building; explicit regulatory mechanisms; and policy adaptation to local contexts. Correspondingly, three policy recommendations were drawn. Formalizing collaborative mechanisms and joint partnerships between cities, setting up regional or international networks of smart cities, and establishing smart city repositories to collect useful case studies for urban planning and governance lessons will accelerate policy transfer for smart city development. This study sheds light on effective ways policymakers can foster policy learning and transfer, especially when a jurisdiction's capacity is insufficient to deal with the uncertainties and challenges ahead.
Perspective on research–policy interface as a partnership: The study of best ...Araz Taeihagh
This article serves as a blueprint and proof-of-concept of Singapore’s Campus for Research Excellence and Technological Enterprise (CREATE) programmes in establishing effective collaborations with governmental partners. CREATE is a research consortium between Singapore’s public universities and international research institutions. The effective partnership of CREATE partners with government stakeholders is part of its mission to help government agencies solve complex issues in areas that reflect Singapore’s national interest. Projects are developed in consultation with stakeholders, and challenges are addressed on a scale that enables significant impact and provides solutions for Singapore and internationally. The article discusses the lessons learnt, highlighting that while research–policy partnerships are widespread, they are seldom documented. Moreover, effective communication proved to be a foundation for an effective partnership where policy and research partners were more likely to provide formal and informal feedback. Engaging policy partners early in the research co-development process was beneficial in establishing effective partnerships.
Whither policy innovation? Mapping conceptual engagement with public policy i...Araz Taeihagh
Abstract
A transition to sustainable energy will require not only technological diffusion and behavioral change, but also policy innovation. While research on energy transitions has generated an extensive literature, the extent to which it has used the policy innovation perspective – entailing policy entrepreneurship or invention, policy diffusion, and policy success – remains unclear. This study analyzes over 8000 publications on energy transitions through a bibliometric review and computational text analysis to create an overview of the scholarship, map conceptual engagement with public policy, and identify the use of the policy innovation lens in the literature. We find that: (i) though the importance of public policy is frequently highlighted in the research, the public policy itself is analyzed only occasionally; (ii) studies focusing on public policy have primarily engaged with the concepts of policy mixes, policy change, and policy process; and (iii) the notions of policy entrepreneurship or invention, policy diffusion, and policy success are hardly employed to understand the sources, speed, spread, or successes of energy transitions. We conclude that the value of the policy innovation lens for energy transitions research remains untapped and propose avenues for scholars to harness this potential.
How transboundary learning occurs: Case Study of the ASEAN Smart Cities Netwo...Araz Taeihagh
While policy study of smart city developments is gaining traction, it falls short of understanding and explaining knowledge transfers across national borders and cities. This article investigates how transboundary learning occurs through the initiation and development of a regional smart cities network: the ASEAN Smart Cities Network (ASCN). The article conducts an in-depth case study from data collected through key informant interviews and document analysis. Spearheaded by Singapore in 2017, ASCN is seen as a soft power extension for Singapore, a branding tool for ASEAN, and a symbiotic platform between the private sector and governments in the region. Most transboundary knowledge transfers within the ASCN are voluntary transfers of policy ideas. Effective branding, demand for knowledge, availability of alternative funding options, enthusiasm from the private actors, and heightened interest from other major economies are highlighted as facilitators of knowledge transfer. However, the complexity of governance structures, lack of political will and resources, limited policy capacity, and lack of explicit operational and regulatory mechanisms hinder transboundary learning. The article concludes that transboundary learning should go beyond exchanges of ideas and recommends promoting facilitators of knowledge transfer, building local policy capacity, encouraging collaborative policy transfer, and transiting from an information-sharing platform to tool/instrument-based transfer.
The governance of the risks of ridesharing in southeast asiaAraz Taeihagh
This document provides an in-depth analysis of the governance strategies used to regulate ridesharing risks in five Southeast Asian countries: the Philippines, Singapore, Indonesia, Malaysia, and Vietnam. It conducted interviews and collected secondary data on regulatory events from 2013 to 2021. The document finds that countries employed different governance strategies, including no-response, prevention-oriented, control-oriented, toleration-oriented, and adaptation-oriented strategies. It provides a timeline of major regulatory actions and examines the risks identified and approaches taken in each country.
How does fakenews spread understanding pathways of disinformation spread thro...Araz Taeihagh
What are the pathways for spreading disinformation on social media platforms? This article addresses this question by collecting, categorising, and situating an extensive body of research on how application programming interfaces (APIs) provided by social media platforms facilitate the spread of disinformation. We first examine the landscape of official social media APIs, then perform quantitative research on the open-source code repositories GitHub and GitLab to understand the usage patterns of these APIs. By inspecting the code repositories, we classify developers' usage of the APIs as official and unofficial, and further develop a four-stage framework characterising pathways for spreading disinformation on social media platforms. We further highlight how the stages in the framework were activated during the 2016 US Presidential Elections, before providing policy recommendations for issues relating to access to APIs, algorithmic content, advertisements, and suggest rapid response to coordinate campaigns, development of collaborative, and participatory approaches as well as government stewardship in the regulation of social media platforms.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
3. enhancing data protection laws and promoting the improvement of personal data storage
and handling and preventing data breaches, along with ensuring equitable access to these
technologies.
Given the high technological and economic uncertainties, these are difficult objectives
to achieve. Due to a lack of information about these technologies and the networked
nature of these technologies, traditional command and control and incentive-based
policy tools are ill-equipped to deal with them. Often few companies dominate the
market and stifle competition. This “winner takes all” dynamic not only favours a few
dominant players but also reduces the number of choices available to the consumer,
increases the risk of monopolistic practices and can lead to increased influence over
standard-setting organisations. There are difficulties in engaging stakeholders and having
inclusive outcomes due to the complex nature of these technologies, which makes
consensus-building difficult. Many stakeholders might not have the necessary expertise
to understand these technologies, further exacerbating the problem.
To overcome these challenges, governments must adopt an adaptive and proactive
approach (Janssen and Van Der Voort 2016; Tan and Taeihagh 2021) and increase
transparency and collaboration by drawing from public consultations and partnerships
with academia, industry and civil society to benefit from a wide range of experiences and
expertise to better understand disruptive technologies and address the challenges they
bring due to information asymmetries, policy uncertainty and power dynamics
(Taeihagh, Ramesh, and Howlett 2021). As such it is important to uphold social values
and rights while striving to maximise benefits from disruptive technologies and build the
capacity of the stakeholders to better understand and navigate the complexities of
disruptive technologies (Lee, Malerba, and Primi 2020).
Overview of the special issue articles
The articles in the special issue examine addressing policy challenges of disruptive
technologies through case studies and comparative analyses. They address gaps in the
literature pertaining to understanding the risks, benefits, and trade-offs of deploying
disruptive technologies in various applications and domains. They explore the efficacy of
traditional governance approaches and explore new regulatory and governance
approaches that have been adopted or ought to be adopted to address the complexity
of deploying disruptive technologies given their uncertainties, risks and unintended
consequences and derived key lessons to facilitate policy learning. Below, a summary
of the articles in the special issue is presented.
Cyberspace and the protection of critical national infrastructure (Weiss and
Biermann, 2023)
Critical national infrastructures (CNI), such as energy, financial services, and transporta
tion, are the foundations of modern societies. The protection of CNIs is necessary from
a national security perspective as well as an economic perspective. Since security is the
domain of the government and market provision involves the private sector, the protec
tion of CNI requires the active participation of both the government and the private
sector.
2 A. TAEIHAGH
4. In Europe, a general standard model of governing the cybersecurity of CNIs can be
observed. This entails the establishment of a new agency or empowering existing agencies
mandated to protect CNI. However, there are variations in how such agencies approach
cybersecurity protection. While some governments employ hierarchical models of CNI
governance, others use a more arms-length coordinative approach. Using two opposite
cases of France and the UK, this article argues that national variations in CNI cyberse
curity designs can be explained by a) the historical institutions of the respective countries;
and b) the nature of the threats themselves.
To elaborate, the authors argue that historically market-capitalist states will employ an
arms-length approach to cybersecurity governance by providing greater independence
and flexibility to the vital operators (VOs). At the same time, state-capitalist countries
will pursue a more centralized and hierarchical mode of governance where few agencies
are given regulative powers over private VOs. The former model requires a greater degree
of coordination amongst various actors involved in the CNI sector, while the latter model
requires the creation of a powerful enforcement agency that has coercive powers to
impose and administer minimum cybersecurity requirements.
On the nature of the threats, the authors argue that two specific cybersecurity-related
problems can be distinguished: a) diffused risks related to the vulnerabilities of the CNI
infrastructure that require better coordination and infrastructure improvement amongst
involved agencies; and b) threats posed by specific actors such as hackers, cyber-
criminals, and other malicious actors that require target protection and rival actor
neutralization. The claim is that governments employ hierarchical forms of governance
mechanisms to protect against actor-centred threats while they require coordination-
related governance mechanisms to address security risks. Even then, a historically state-
capitalist state is comparatively still more likely to employ hierarchical governance
models on security risks, while market capitalists are more likely to employ horizontal
governance forms for threats.
The authors conduct a structured comparison between the UK and France by exam
ining official documents, government reports and other legal documents from 2010 to
2018 and comparing the two countries’ governance approaches. They examine the
approaches taken by their respective CNI-related cybersecurity agencies, the French
Network and Information Security Agency (ANSSI) and the British National Cyber
Security Centre (NCSC) and compare their protection capacity and policy approach
styles. The authors find that, CSI protection in France takes a highly centralized
approach. The ANSSI is the exclusive national authority in charge of cyber protection,
has a staff of six hundred people and an annual budget of over one hundred million
euros. The agency was created in 2009 and directly reports to the Prime Minister’s office.
The NCSC, however, only became a centralized agency for cyber protection in 2016 due
to the EU Network and Information System (NIS) directive and was otherwise
a patchwork of various agencies.
The authors also argue that although both countries involve the private sector to
manage diffuse risks, the UK’s reliance on the private sector is greater. In France, the
ANSSI is empowered by the Military Programming Act and the Critical Infrastructures
Information Protection (CIIP law) to require VOs to strengthen their security system.
VOs are further required to notify of any cyber incidents, to enforce minimal standards,
and oblige by the hierarchical monitoring mechanism under the law. The UK,
JOURNAL OF ECONOMIC POLICY REFORM 3
5. meanwhile, relies on financial incentives and guidance to induce private and public
sectors to improve their cybersecurity infrastructure and the Centre for the Protection
of National Infrastructures (CPNI) plays an advisory and facilitative role in this regard.
A similar approach can be noticed in risk management, where the ANSSI relies on
government certification to ensure the quality of risk management, while the UK
provides advisory services to guide the private sector towards public-private or private
certification services.
Overall, the article shows that historical institutions are crucial determinants of policy
designs, even for emerging technologies such as the cybersecurity of CNI. The author
suggests that effective CNI protection requires collaboration between public and private
actors to address the disruptive nature of cyber threats.
Competing perspectives on the big data revolution: a typology of applications in
public policy (Wong and Hinnant 2023)
The use of big data in government has been fraught with contradictions. Proponents of
the technology argue that big data can be used for evidence-based policymaking for
better service delivery and reduced cost through digitalization. Big data has also been
considered useful for measuring and evaluating performances, collaboration between
citizens and the state, and better coordination amongst policymakers by encouraging
information sharing. However, the use of big data has also been associated with various
negative externalities, such as the greater potential for algorithmic discrimination, greater
digital divide and the consequent digital inequality, and privacy threats. Given the high
level of expertise required, its usefulness has also been questioned because of the
potentially low capacity of data utilization amongst policymakers.
Previous experiences from ICT adoption have shown that successful mobilization of
technology, both in private and public organizations, is contingent upon a wide variety of
factors that are both exogenous and internal to the organizations. Quite often, even in
established technologies, organizations need to adapt, modify, or transform such tech
nologies before applying them internally. The authors argue that the benefits and costs
associated with adopting such technologies (e.g. big data) are moderated by a set of
internal and external factors under which organizations operate. In the context of Big
Data, they examine such factors under political, economic, social, organisational, values
and ethics, and regulatory dimensions.
The authors then dig into the last dimension, which is regulation, and attempt to
understand how, given a country’s regulatory capacity and nature, different approaches
to technology use might evolve. While they admit that they have deliberately ignored
multiple other dimensions along which such analysis can be done, for this study, they
identify two areas of classification: a) regulatory orientation; and b) information reci
procity. Regulatory orientation refers to the degree of empowerment provided to the
public or the private sector in the regulations that govern data in the country. The
orientation depends on the existing political economy and can determine policy
approaches to important issues such as privacy, personal freedom, and autonomy in
data management. More privacy-related regulations, for instance, empower the private
sphere and weakens the government’s influence on data management. Similarly, infor
mation reciprocity refers to the incentive structure that facilitates information sharing
4 A. TAEIHAGH
6. across various private and public actors that generate and use the data. Information
reciprocity is often a function of the degree of trust and partnership between such actors.
Based on the two variables, the authors derive a typology of the application of big data,
which helps in understanding the different applications of big data in public policy and
their potential benefits and drawbacks. The authors categorise the big data applications
and provide examples as state-centric (public and information reciprocity, e.g. US’s
Patriot Act), big brother (public and information non-reciprocity, e.g. China’s social
credit system), society-centric (private and information reciprocity, e.g. EU’s GDPR) and
fragmented big data (private and information non-reciprocity, e.g. Hong Kong’s smart
city development initiative). This highlights the importance of context and nature of the
big data application as well as the need for appropriate levels of regulations and provision
of ethical guidelines to ensure the responsible use of such technology. The article
concludes by saying that typologies and classifications developed in the study should
be used to set up testable hypotheses and can enrich empirical work of the future.
An integrated complex adaptive governmental policy response to cyber threats
(Porter and Tan, 2023)
Technologies of today are characterized by a high degree of complexity. This is truer for
cyber threats, characterized by various specific challenges. Cyber threats are associated
with a high degree of uncertainty and unpredictability. Since the nature of threats is
constantly evolving, and so are the anonymous actors posing these threats, designing
linear problem-solving mechanisms to address cybersecurity challenges is ineffectual. For
instance, in the case of ransomware as a service (RaaS), the lead actor is often a service
provider that enables primary threat actors to carry out ransomware attacks in return for
a share of ransomware. Cyber threats are also characterized by a potential multiplicity of
origins of threats. The scope of cyber threats can be at global, national, local, or individual
levels, where scope refers to the location of the source of threats and the location of the
potential victims of threats.
These specificities of cyber threats mean that governance-related responses to these
challenges must display complex adaptive designs. The authors discuss policy options
available to governments to address cyber threats and argue for an adaptive design
approach, as linear planning and policy design requires that policymakers anticipate
the nature of the problem at hand and the desired outcome and create a path of change
through the policy. Under conditions of high degree of uncertainty and complexity
pertaining to cyber threats, such design thinking often fail. Therefore, the authors
identify specific characteristics of complex policy systems to tackle this issue: self-
organization, feedback loops, experimentation, and adaptation. Together, these four
features permit connectivity between actors, openness to external knowledge absorption
and assimilation, non-linear and iterative problem-solving, and experimentation.
The authors argue that cyber threats are complex problems to address due to the
presence of these four properties. In particular, the authors claim that any response to
cyber threats must be aimed at enhancing the coordinated decentralized capacity for
experimentation and resilience. Three elements of this response need attention.
Coordinated decentralization capacity requires abilities related to self-organization,
involvement of a multitude of actors, and synchronicity in approaches between various
JOURNAL OF ECONOMIC POLICY REFORM 5
7. subsystems and actors. The role of the government is more of an organizer or an activist
rather than a policy monopolist or a bystander. Resilience requires the capacity of the
system to bounce back after perturbations, and experimentation entails creative thinking
and non-traditional approaches to problem-solving.
Response to the locational complexity also requires approaching challenges at all levels
simultaneously, recognizing the interrelatedness between any emerging policy design. To
elaborate, it is important to design international norms to reduce global-scale threats and
mechanisms to facilitate international support to protect against global threats. At a local
level, governments must ensure sufficient support to the private sector to enable them to
invest in cybersecurity. At the same time, creating a collaborative environment that can
promote information and expertise sharing and coordination between actors across
various locations is also vital. Similarly, trainings, awareness campaigns, and regulations
against cybercrimes can contribute to better protection at the individual level.
The authors use the case of the 2007 cyberattack in Estonia to illustrate how complex
policy design can help governments approach potential problems related to cyber threats.
In 2007, a distributed denial-of-service (DDOS) was carried out in Estonia, targeting
government bodies, ministries, banks, media sources, and other private companies.
The Estonian approach to this attack and its subsequent reforms highlight the com
plex policy design system’s strengths, especially its coordinated decentralized capacity for
experimentation and resilience. The Estonian Government created the Estonian
Computer Emergency Response Team (CERT) in 2006. CERT was a national-level
coordinating body responsible for coordinating various public and non-public agencies
within the country but simultaneously with close relationships with international and
other national cybersecurity agencies. Various initiatives have been undertaken within
Estonia to prepare the country against such attacks. In 2006, the Estonian government
signed an MOU with firms operating in critical sectors to share information on cyber
threats. Beyond Estonia, the country had signed the Council of Europe’s Convention on
Cybercrime in 2001 and had established a cyber defence centre of excellence as a member
of NATO.
After the cyberattack, the government actively pursued information sharing and
coordination between the public and private sectors. It also established a voluntary
Estonian Defence League’s Cyber Unit that included programmers conducting regular
training and exercises for the public and private sectors. It created various collaboration
platforms, such as the cybersecurity in AI accelerator and the Cyber Command (2019),
which consisted of active membership from experts from private, military, and public
domains. The government is also actively working with educational institutions to
organize awareness programs and competitions to generate skilled human resources in
the sector. Beyond Estonia, the government has also established a cyber partnership
agreement with the US and worked with NATO on establishing the Cooperative Cyber
Defence Centre of Excellence.
Therefore, given the complex nature of challenges, the government’s efforts have
focused on global, national, local, and individual levels, focusing on elements of coordi
nated decentralized capacity for experimentation and resilience. The authors call for
a comprehensive and adaptive approach to respond to cyber threats. Built not only based
6 A. TAEIHAGH
8. on technical measures but also including broader institutional changes such as building
partnerships and increasing coordination among the public and private sectors.
Navigating the governance challenges of disruptive technologies: insights from
regulation of autonomous systems in Singapore (Pande and Taeihagh, 2023)
Autonomous systems (AS) can potentially lead to a greener, more efficient, and more
productive economic future. However, at present, various operational, legal, economic,
social, and ethical challenges are associated with the governance of AS (Pande and
Taeihagh, 2023). Addressing these challenges is crucial for creating a conducive environ
ment for fruitful utilization of AS. Regulating new technologies is always difficult, given
the pacing problem associated with them. The complexities of the AS, however, make
their regulation more difficult. First, inherent uncertainties associated with the opera
tions of AS limit the information available to make assessments about their risks ex-ante
difficult. Second, the risks of AS differ as per their form and application. AS is a broader
umbrella term under which different forms of systems operate. Autonomy and the level
of risks presented by different AS systems are dissimilar. At the same time, the same AS
might present different risks depending on the environment in which they are applied
(Pande and Taeihagh, 2023).
It then becomes important to understand how policymakers have attempted to wrestle
with these two challenges to design regulatory frameworks governing AS to promote
their experimentation and application. The authors take the case of Singapore to under
stand the specific challenges associated with the governance of various AS and the
regulatory frameworks that can address these challenges without constraining the inher
ent need for application and experimentation.
The authors identify operational, legal, economic, social, and ethical challenges for
autonomous vehicles, unmanned aerial vehicles, industrial robots, and personal care
robots. They then specify how Singapore has created regulations to address these
challenges for various AS. The study describes the specific peculiarities associated with
the four technologies across the five types of challenges and then identifies steps taken to
minimize associated risks. The authors identify various regulatory measures undertaken
by the Singapore government. Such measures included mandatory human supervision,
designating responsibility for control, the existence of a stopping mechanism, creation of
standards for data collection, storage, protection, and use, among others (Pande and
Taeihagh, 2023).
The study highlights that the Singapore government’s response has addressed
most of the generic and domain-specific challenges associated with AS. The
authors argue that Singapore has adopted a control-oriented strategy that has
successfully limited the risks of the technology while making the country a test-
bed for experimentation and use. This has meant that policymaking has paid
special focus on ensuring the government regularly reviews and updates its
regulations, that experimentation and policymaking have been a coordinated effort
which involves the participation of a wide variety of stakeholders, and that
sufficient attention is paid to safety concerns to ensure lives and livelihoods are
protected. The authors highlight that there is room for further developments in
response to ethical dilemmas and social challenges associated with adopting AS.
JOURNAL OF ECONOMIC POLICY REFORM 7
9. Additionally, the authors argue for stronger and clearer liability-related regula
tions and stress the need for the regulations to be more frequently revisited and
revised to adapt to the rapid pace of technological developments (Pande and
Taeihagh, 2023). The authors suggest that governments can take steps to intro
duce experimental regulations and sunset clauses that permit flexibility in use and
encourage experimentation while minimizing risks.
The article highlights governments’ critical role in navigating disruptive technologies’
challenges and calls for a comprehensive and proactive approach not only through
regulatory measures but also through fostering collaboration and stakeholder engage
ment to promote responsible innovation.
Addressing policy challenges of disruptive technologies: key takeaways
What are some of the common challenges that disruptive technologies bring about that
necessitate policy responses from governments? Based on the articles in the special issue,
some of the common themes that emerge in relation to addressing the challenges of
disruptive technologies include (see Table 1):
Emphasis on the role of the government
All the articles underscore the critical role of the government in addressing the challenges
posed by disruptive technologies. They emphasise that beyond deploying direct policy
measures such as regulations and law enforcement, there is a need to promote awareness,
promote collaboration and partnerships among the stakeholders, and encourage ethical
and responsible innovation.
Need for comprehensive policies
The articles highlight the need for comprehensive policies that consider the complexity
and interconnectedness of disruptive technologies. They emphasise that the policies
should not only focus on the technical aspects of these technologies but also their social,
economic, and political dimensions.
Adaptive and proactive approach
Due to the rapid pace of technological developments and the complexity of
technological systems that disruptive technologies create, controlling and regulat
ing them all in one go is difficult. Articles highlight various types of risks (cyber
threats, data management, privacy, discrimination, ethical dilemmas, etc.) and the
need for anticipating potential threats/challenges and developing strategies to
address them before they occur. They advocate taking an adaptive approach,
actively monitoring the situation and having the flexibility to continuously update
policies in response to evolving risks and changes to the circumstances. They
highlight the need to address the skills and capacity gaps in the public sector and
among stakeholders.
8 A. TAEIHAGH
11. Need for interdisciplinary research
The need for interdisciplinary research to understand and address the challenges
posed by disruptive technologies is emphasised by all of the articles in the special
issue due to the complex nature of these technologies. Aside from a better under
standing of the technical aspects of these technologies, there is a need for a deeper
understanding of their economic, political, legal, social, and ethical implications.
While these technologies can potentially enhance citizen engagement and service
delivery, they can also create safety risks and result in discrimination, inequality
and digital divide.
Data management and privacy
Disruptive technologies often rely on the collection, storage and use of large amounts of
data, and there is a need to highlight the importance of data literacy and regulations for
data protection. Wong and Hinnant, (2023) and Pande and Taeihagh, (2023), in parti
cular, emphasise the challenges related to data management and privacy regarding the
use of Big Data and Autonomous systems, while other papers in the special issue
indirectly touch on this theme.
The common themes highlighted in Table 1 emphasise the role of government and the
need for comprehensive and adaptive policies to address the challenges of disruptive
technologies. Additionally, the need for interdisciplinary research to unpack the risks and
impacts of these technologies, along with improving data management and privacy, is
stressed.
Acknowledgments
Araz Taeihagh is grateful for the funding support provided by the Lee Kuan Yew School of
Public Policy, National University of Singapore. The special issue editor would like to thank
Professor Judith Clifton, the editor of the Journal of Economic Policy Reforms and all the
anonymous reviewers for their constructive feedback and support for this special issue on
Addressing Policy Challenges of Disruptive Technologies. A special thanks to Hazel Lim,
Devyani Pande, Siying Tan and Shaleen Khanal of the Policy Systems Group for their support
in organising this special issue.
Disclosure statement
No potential conflict of interest was reported by the author(s).
Funding
This work was supported by the Lee Kuan Yew School of Public Policy, National University of
Singapore.
ORCID
Araz Taeihagh http://orcid.org/0000-0002-4812-4745
10 A. TAEIHAGH
12. References
Cagigas, D., J. Clifton, D. Diaz-Fuentes, M. Fernández-Gutiérrez, and C. Harpes. 2023.
“Blockchain in Government: Toward an Evaluation Framework.” Policy Design and Practice
1–18. https://doi.org/10.1080/25741292.2023.2230702.
Clifton, J., A. Glasmeier, and M. Gray. 2020. “When Machines Think for Us: The Consequences
for Work and Place.” Cambridge Journal of Regions, Economy & Society 13 (1): 3–23. https://doi.
org/10.1093/cjres/rsaa004 .
Janssen, M., and H. Van Der Voort. 2016. “Adaptive Governance: Towards a Stable, Accountable
and Responsive Government.” Government Information Quarterly 33 (1): 1–5. https://doi.org/
10.1016/j.giq.2016.02.003.
Lee, K., F. Malerba, and A. Primi. 2020. “The Fourth Industrial Revolution, Changing Global Value
Chains and Industrial Upgrading in Emerging Economies.” Journal of Economic Policy Reform
23 (4): 359–370. https://doi.org/10.1080/17487870.2020.1735386.
Pande, D., and A. Taeihagh. 2023. “Navigating the Governance Challenges of Disruptive
Technologies: Insights from Regulation of Autonomous Systems in Singapore.” Journal of
Economic Policy Reform 1–22. https://doi.org/10.1080/17487870.2023.2197599.
Porter, T., and N. Tan. 2023. “An Integrated Complex Adaptive Governmental Policy Response to
Cyberthreats.” Journal of Economic Policy Reform 1–15. https://doi.org/10.1080/17487870.2022.
2125390 .
Taeihagh, A., M. Ramesh, and M. Howlett. 2021. “Assessing the Regulatory Challenges of
Emerging Disruptive Technologies.” Regulation & Governance 15 (4): 1009–1019. https://doi.
org/10.1111/rego.12392.
Tan, S. Y., and A. Taeihagh. 2021. “Adaptive Governance of Autonomous Vehicles: Accelerating
the Adoption of Disruptive Technologies in Singapore.” Government Information Quarterly
38 (2): 101546. https://doi.org/10.1016/j.giq.2020.101546.
Tan, S. Y., A. Taeihagh, and A. Tripathi. 2021. “Tensions and Antagonistic Interactions of Risks
and Ethics of Using Robotics and Autonomous Systems in Long-Term Care.” Technological
Forecasting and Social Change 167:120686. https://doi.org/10.1016/j.techfore.2021.120686.
Weiss, M., and F. Biermann. 2023. “Cyberspace and the Protection of Critical National
Infrastructure.” Journal of Economic Policy Reform 1–18. https://doi.org/10.1080/17487870.
2021.1905530.
Wong, W., and C. Hinnant. 2023. “Competing Perspectives on the Big Data Revolution:
A Typology of Applications in Public Policy.” Journal of Economic Policy Reform 1–15.
https://doi.org/10.1080/17487870.2022.2103701.
World Bank. (2018). World Development Report 2019: The Changing Nature of Work. The World
Bank. https://www.worldbank.org/en/publication/wdr2019.
JOURNAL OF ECONOMIC POLICY REFORM 11