TA for human security: Aligning security cultures with human security in AI innovation

Authors

DOI:

https://doi.org/10.14512/tatup.33.2.16

Keywords:

security cultures, artificial intelligence, digital humanism, fundamental human rights, digital ethics

Abstract

This research article addresses the growing concerns about digital technologies and artificial intelligence and their impact on human security. It explores the inadequacies of current digital technology regulation in protecting fundamental human rights. The authors present a typology of three “security cultures for digital technology” based on Mary Kaldor’s work on human security, linking international relations and critical security studies with technology assessment (TA). The following cultures are distinguished: dual use, cybersecurity, and TA. The article concludes with a call for collaborative efforts among policy makers, industry, and civil society to prioritize a human-centered approach and global cooperation mechanisms and to strengthen the TA culture in order to address AI innovation without compromising human rights.

References

Alic, John (1994): The dual use of technology. Concepts and policies. In: Technology in Society 16 (2), pp. 155–172. https://doi.org/10.1016/0160-791X(94)90027-2 DOI: https://doi.org/10.1016/0160-791X(94)90027-2

Bay, Morten (2016): What is cybersecurity? In search of an encompassing definition for the post-Snowden era. In: French Journal for Media Research 6, pp. 1–28. Available online at https://frenchjournalformediaresearch.com:443/lodel-1.0/main/index.php?id=988, last accessed on 07. 06. 2024.

Bostrom, Nick (2014): Superintelligence. Paths, dangers, strategies. Oxford: Oxford University Press.

Buzan, Barry; Hansen, Lene (2009): The evolution of international security studies. Cambridge, UK: Cambridge University Press. https://doi.org/10.1017/CBO9780511817762 DOI: https://doi.org/10.1017/CBO9780511817762

Cavelty, Myriam (2007): Cyber-security and threat politics. US efforts to secure the information age. Abingdon: Routledge.

Chesney, Robert; Citron, Danielle (2019): Deep fakes. A looming challenge for privacy, democracy, and national security. In: California Law Review 107, pp. 1753–1819. https://doi.org/10.2139/ssrn.3213954 DOI: https://doi.org/10.2139/ssrn.3213954

Ciancaglini, Vincenzo et al. (2020): Malicious uses and abuses of artificial intelligence. Available online at https://www.europol.europa.eu/cms/sites/default/files/documents/malicious_uses_and_abuses_of_artificial_intelligence_europol.pdf, last accessed on 25. 04. 2024.

Clarke, Roger (1994): Asimov’s laws of robotics. Implications for information technology. In: Computer 27 (1), pp. 57–66. https://doi.org/10.1109/2.248881 DOI: https://doi.org/10.1109/2.248881

Daws, Ryan (2020): Medical chatbot using OpenAI’s GPT-3 told a fake patient to kill themselves. In: AI News, 28. 10. 2020. Available online at https://www.artificialintelligence-news.com/2020/10/28/medical-chatbot-openai-gpt3-patient-kill-themselves/, last accessed on 25. 04. 2024.

Dwyer, Andrew; Stevens, Clare; Muller, Lilly; Cavelty, Myriam; Coles-Kemp, Lizzie; Thornton, Pip (2022): What can a critical cybersecurity do? In: International Political Sociology 16 (3), pp. 1–26. https://doi.org/10.1093/ips/olac013 DOI: https://doi.org/10.1093/ips/olac013

Freeman, Christopher (2009): The ICT paradigm. In: Robin Mansell et al. (eds.): The Oxford Handbook of Information and Communication Technologies. Oxford: Oxford University Press, pp. 34–54. https://doi.org/10.1093/oxfordhb/9780199548798.003.0002 DOI: https://doi.org/10.1093/oxfordhb/9780199548798.003.0002

Frischmann, Brett; Selinger, Evan (2018): Re-engineering humanity. Cambridge, UK: Cambridge University Press. DOI: https://doi.org/10.1017/9781316544846

Kaldor, Mary (2007): Human security. Cambridge, UK: Polity.

Kaldor, Mary (2018): Global security cultures. Cambridge, UK: Polity.

Lindstrom, Gustav (2012): Meeting the cyber security challenge. In: GCSP Geneva Papers Research Series 7. Available online at https://www.files.ethz.ch/isn/147788/7-2012.pdf, last accessed on 25. 04. 2024.

Mahfoud, Tara; Aicardi, Christine; Datta, Saheli; Rose, Nikolas (2018): The limits of dual use. In: Issues in Science and Technology 34 (4), pp. 73–78. Available online at https://issues.org/the-limits-of-dual-use/, last accessed on 25. 04. 2024.

Mazzucato, Mariana (2013): The entrepreneurial state. Debunking public vs. private sector myths. London: Anthem Press.

McGrew, Anthony (1992): Global politics in a transitional era. In: Anthony McGrew and Paul Lewis (eds.): Global politics. Globalization and the Nation-State. Cambridge, UK: Polity, pp. 312–330.

McLeish, Caitriona; Nightingale, Paul (2007): Biosecurity, bioterrorism and the governance of science. The increasing convergence of science and security policy. In: Research Policy 36 (10), pp. 1635–1654. https://doi.org/10.1016/j.respol.2007.10.003 DOI: https://doi.org/10.1016/j.respol.2007.10.003

Molas-Gallart, Jordi; Robinson, Julian (1997): Assessment of dual technologies in the context of European security and defence. Report for the Scientific and Technological Options Assessment (STOA). Luxembourg: European Parliament.

Nida-Rümelin, Julian; Weidenfeld, Nathalie (2022): Digital humanism. For a humane transformation of democracy, economy and culture in the digital age. Cham: Springer. https://doi.org/10.1007/978-3-031-12482-2 DOI: https://doi.org/10.1007/978-3-031-12482-2

Penney, Jon; McKune, Sarah; Gill, Lex; Deibert, Ronald (2018): Advancing human rights-by-design in the dual-use technology industry. In: Columbia Journal of International Affairs 71 (2), pp. 103–110. Available online at https://ssrn.com/abstract=3218975, last accessed on 07. 05. 2024.

Perez, Carlota (2003): Technological revolutions and financial capital. The dynamics of bubbles and golden ages. Cheltenham: Edward Elgar. DOI: https://doi.org/10.4337/9781781005323

Rath, Johannes; Ischi, Monique; Perkins, Dana (2014): Evolution of different dual-use concepts in international and national law and its implications on research ethics and governance. In: Science and Engineering Ethics 20 (3), pp. 769–790. https://doi.org/10.1007/s11948-014-9519-y DOI: https://doi.org/10.1007/s11948-014-9519-y

Selgelid, Michael (2009): Governance of dual-use research. An ethical dilemma. In: Bulletin of the World Health Organization 87 (9), pp. 720–723. https://doi.org/10.2471/BLT.08.051383 DOI: https://doi.org/10.2471/BLT.08.051383

Spiekermann, Sarah; Winkler, Till (2022): Value-based engineering with IEEE 7000. IEEE Technology and Society Magazine 41 (3), pp. 71–80. https://doi.org/10.1109/MTS.2022.3197116 DOI: https://doi.org/10.1109/MTS.2022.3197116

Taecharungroj, Viriya (2023): “What can ChatGPT do?” Analyzing early reactions to the innovative AI chatbot on Twitter. In: Big Data and Cognitive Computing 7 (1), p. 35. https://doi.org/10.3390/bdcc7010035 DOI: https://doi.org/10.3390/bdcc7010035

Tuerlings, Emmanuelle; Robinson, Julian (n.d.): The trilateral network associated with the Chemical Weapons Convention. Case study for the UN vision project on global public policy networks. Sussex: University of Sussex. Available online at https://citeseerx.ist.psu.edu/document?repid=rep1&type=pdf&doi=6142cc246bd45db237f409d982a965f958fbbd1c, last accessed: 25. 04. 2024.

UNDP – United Nations Development Programme (1994): Human development report 1994. New York, NY: Oxford University Press. Available online at https://hdr.undp.org/system/files/documents/hdr1994encompletenostats.pdf, last accessed: 25. 04. 2024.

Venkit, Pranav; Srinath, Mukund; Wilson, Shomir (2022): A study of implicit bias in pretrained language models against people with disabilities. In: Nicoletta Calzolari et al. (eds.): Proceedings of the 29th International Conference on Computational Linguistics. Gyeongju: COLING, pp. 1324–1332. Available online at https://aclanthology.org/2022.coling-1.113.pdf, last accessed: 25. 04. 2024.

Werthner, Hannes et al. (2019): Vienna manifesto on digital humanism. Available online at https://caiml.org/dighum/dighum-manifesto/Vienna_Manifesto_on_Digital_Humanism_EN.pdf, last accessed: 25. 04. 2024.

Werthner, Hannes et al. (eds.) (2024): Introduction to digital humanism. A Textbook. Cham: Springer. https://doi.org/10.1007/978-3-031-45304-5 DOI: https://doi.org/10.1007/978-3-031-45304-5

Downloads

Published

28.06.2024

How to Cite

1.
Sinozic-Martinez T, Jahnel J. TA for human security: Aligning security cultures with human security in AI innovation. TATuP [Internet]. 2024 Jun. 28 [cited 2024 Jul. 25];33(2):16-21. Available from: https://www.tatup.de/index.php/tatup/article/view/7115

Most read articles by the same author(s)