Affiliation:
1. Principal, Xamax Consultancy Pty Ltd, Canberra, Australia
2. Visiting Professor in UNSW Law, Sydney, Australia
3. Australian National University, Canberra, Australia
Abstract
Artificial Intelligence (AI) is one of the most significant of the information and communications technologies being applied to surveillance. AI’s proponents argue that its promise is great, and that successes have been achieved, whereas its detractors draw attention to the many threats embodied in it, some of which are much more problematic than those arising from earlier data analytical tools. This article considers the full gamut of regulatory mechanisms. The scope extends from natural and infrastructural regulatory mechanisms, via self-regulation, including the recently-popular field of ‘ethical principles’, to co-regulatory and formal approaches. An evaluation is provided of the adequacy or otherwise of the world’s first proposal for formal regulation of AI practices and systems, by the European Commission. To lay the groundwork for the analysis, an overview is provided of the nature of AI. The conclusion reached is that, despite the threats inherent in the deployment of AI, the current safeguards are seriously inadequate, and the prospects for near-future improvement are far from good. To avoid undue harm from AI applications to surveillance, it is necessary to rapidly enhance existing, already-inadequate safeguards and establish additional protections.
Subject
Public Administration,Sociology and Political Science,Communication,Information Systems
Reference82 articles.
1. Investigating the Use of the Stakeholder Notion in Project Management Literature: A Meta-Analysis;Achterkamp;International Journal of Project Management,2008
2. Outline for a theory of intelligence;Albus;IEEE Trans. Systems, Man and Cybernetics,1991
3. Anderson, C. (2008). The End of Theory: The Data Deluge Makes the Scientific Method Obsolete. Wired Magazine, 16(7), http://archive.wired.com/science/discoveries/magazine/16-07/pb_theory.
4. Anderson, R. (2020). Security Engineering: A Guide to Building Dependable Distributed Systems, 3rd Edition, Wiley.
5. Ayres, I., & Braithwaite, J. (1992). Responsive Regulation: Transcending the Deregulation Debate, Oxford Univ. Press.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献