SlideShare a Scribd company logo
1 of 8
Download to read offline
1
COMMON GOOD
DIGITAL FRAMEWORK
Campaign Proposal
Data Ductus, Inc. |
B.S. Computer Engineering,
Northeastern University
Software Engineer |
Computer Ethics and Data
Policy Advocate
Rebecca Leeper
BGF Cyber Security Day Symposium – Common Good Digital Framework
2
Common Good Digital Framework Action Plan
PURPOSE
The Common Good Digital Framework (CGDF) will serve as a platform to bring
authoritative knowledge and raise awareness about violations of ethical values
and standards by governments and large organizations.
The platform will monitor and alert against the misuse of Artificial Intelligence
(AI), personal data, and neglect of cyber security. The objectives of the
campaign are to stimulate and galvanize civil society towards the need to create
new norms and regulations, and therein influence public and private AI and
cyber policy.
FOCUS
The CGDF will primarily focus on AI bias, privacy (data security), and cyber
security. It will specifically monitor and determine when digital activity and AI
misuse violates common values and shared ethical principles and put forth a
remediation action plan. In particular, the CGDF will identify areas where there
are no regulations and common standards and will propose new courses of
action. Secondarily, the CGDF will address and identify good cyber practices
BGF Cyber Security Day Symposium – Common Good Digital Framework
3
that can serve as guiding models. Both findings will contribute to the generation
of an Ethics and Practice Index designed for policy makers, Chief Technology
Officers, and other digital actors. The Framework will examine both public
institutions (governments) and private corporations. Some critical governments
to observe include China, Estonia, some member states of the European Union,
Israel, Japan, Russia, Saudi Arabia, and The United States. In the private
sector, companies such as Alibaba, Amazon, Apple, Baidu, Facebook, Google,
Microsoft, and Tencent will be prioritized.
MONITORING METHOD
The campaign will rely primarily on open source resources to stay up to date on
digital activity – newspapers, magazines like Wired and Medium, journals and
reports of authoritative institutions and news media. Secondarily, participation in
key policy meetings, global summits, and international panels will both promote
the Framework and provide insight into the digital activities of relevant actors.
When possible, interviews will also be pursued, with the goal to create a network
of trusted scholarly and practitioner advisors. In due time, the CGDF will form a
board of expert advisors and relevant experts that will often be consulted and
meet annually. Additionally, it will create a database of knowledge and learned
people who can provide counsel and consultation.
RESPONSE METHOD
In response to identified violations, lack of regulatory frameworks, and the
detrimental absence of commonly agreed norms and policies to the public well-
being, the CGDF will generate a course of action and a policy recommendation
by first reaching out to the relevant stakeholders. The policy recommendation
will be circulated to all stakeholders and the CGDF network first for feedback
and secondly to encourage corrective action by the offender. For example,
should a country be violating its citizens rights, the policy presented may be for
other states to apply sanctions or a trade embargo on that country. Following,
BGF Cyber Security Day Symposium – Common Good Digital Framework
4
the CGDF will publicly publish the recommendation without disclosing the
names of the violators. The purpose of this publication will be to draw public
attention to the type of violations already occurring. In a later stage, if no
corrective action was pursued, the CGDF will reveal the names of the
perpetrators publicly, to be amplified by the CGDF network and its partners.
MEANS OF DISTRIBUTION
The campaign will utilize social media, a website, and journal publications.
PARTNERS
Partners will be expected to contribute data and evidence when governments
and/or companies violate norms. In response to violations, partners will join
together their voices, resources, and platform, serving as change agents and
advocates.
Professor Denise Garcia of Northeastern University; Professor Woodrow
Hartzog of Northeastern University; and CGDF Leader Juan Gallego. The
CGDF will also seek to connect other young AIWS leaders and cyber advocates
in the world.
Potential Future Partners:
Professor Stuart Russell, UC Berkley
President Joseph Aoun, Northeastern University
Dr. Eva-Marie Muller-Stuler, Chief Data Scientist and Leader Data Sceince
Centre of Excellence, IBM
Sacha Alanoca, AI Policy Researcher at The Future Society
Maria Luciana Axente, PWC UK AI Commons
Aimee van Wynsberghe. Co-director Foundation for Responsible Robotics
Rebecca Distler, World Economic Forum Global Shaper
Yolanda Lannquist, Head of Research at The Future Society
Irakli Beridze, Head of the Centre for Artificial Intelligence and Robotics, UNICRI
BGF Cyber Security Day Symposium – Common Good Digital Framework
5
James Butcher, Committee Member – Global AI & Ethics Initiative – IEEE
Representatives from other local and international NGOs
ACTION PLAN
1. Identify and assign an enthusiastic person for communications on social
media for the CGDF
2. Identify and assign an enthusiastic person for outreach to connect other
young people to join and contribute to the CGDF
3. Identify and seek out local and international NGOS to join the CGDF
network
4. Identify and seek out relevant scholarly leaders to join the CGDF network
5. Identify and seek out leading cyber industry professionals to join the
CGDF network
6. Identify and seek out relevant policymakers to join the CGDF network
7. Identify and seek out relevant conferences
8. Draft a report to present at AIWS Summit April 28-29, 2020 at Harvard
University
9. Develop a rollout plan for publications and reports
10. Coordinate the campaign with the celebration of Plymouth 400th
BGF Cyber Security Day Symposium – Common Good Digital Framework
6
Importance
The extensive use of the cloud, internet, and interconnected networks to
manage and control infrastructure and the vulnerabilities associated with
connectivity prone to hacking and interference pose significant security threats
to human security (or the security and privacy of individuals), but also that of the
state, and subsequently the international system, as this cyber domain can no
longer be protected and observed by physical boundaries. The expansion
extends to all aspects of a state’s activity, including the private and public
sectors rapidly adapting to the cloud and cloud computing environment for
information storage, the internet being used to manage electric power
generation, and the water levels in dams remotely by use of what is known as
the Supervisory Control and Data Acquisition (SCADA) systems, and
distribution networks for food, water, energy, transportation, healthcare, and
financial services also depend heavily on the internet and information
technology (IT). Moreover, the military depends on IT for command, control, and
logistics, and modern-day weapons depend on GPS networks, and movements
and actions of military forces are coordinated through networks that allow for
immediate information exchange. This entire domain, which is interlinked with
what is known as the critical infrastructure of a state, is highly vulnerable to a
cyberattack.
Some Attacks on Critical Infrastructure
• BlackEnergy3 and CrashOveride : Ukraine Power Grid -2015 and 2016
• DragonFly/Energetic Bear: US Energy companies – 2011-2016
• Triton Attack : Saudi Petrochemical Plant – 2014-2017
• Agent.btz: US military networks – 2008
Some personal data leaks
• In 2016, 3 billion Yahoo accounts were hacked in one of the biggest
breaches of all time.
• In 2016, Uber reported that hackers stole the information of over 57 million
riders and drivers.
• In 2017, 412 million user accounts were stolen from Friendfinder’s sites.
• In 2017, 147.9 million consumers were affected by the Equifax Breach.
• According to 2017 statistics, there are over 130 large-scale, targeted
breaches in the U.S. per year, and that number is growing by 27 percent
per year.
BGF Cyber Security Day Symposium – Common Good Digital Framework
7
• 100,000 groups in at least 150 countries and more than 400,000 machines
were infected by the Wannacry virus in 2017, at a total cost of around $4
billion.
• Attacks involving cryptojacking increased by 8,500 percent in 2017.
• In 2017, 5.4 billion attacks by the WannaCry virus were blocked.
• There are around 24,000 malicious mobile apps blocked every day.
• In 2017, the average number of breached records by country was 24,089.
The nation with the most breaches annually was India with over 33k files;
the US had 28.5k.
• In 2018, Under Armor reported that its “My Fitness Pal” was hacked,
affecting 150 million users.
• Between January 1, 2005 and April 18, 2018 there have been 8,854
recorded breaches.
Other Cybercrime Statistics
• Total damage related to cybercrime is projected to hit 6 trillion annually by
2021
• There is a hacker attack every 39 seconds
• 60% of Americans have been exposed to fraud schemes
• 95 percent of breached records came from three industries in 2016:
Government, retail, and technology
The Fourth Industrial Revolution (4IR) is rapidly emerging before our very eyes;
science and technology are advancing at unprecedented rates that have
culminated in what the World Economic Forum’s “Global Risks Report of 2017”
calls the “twelve key emerging technologies” (WEF, 2017). Among the twelve,
one technology in particular has the potential to transform warfare, impact
healthcare, alter humanity and the environment. AI advancements can lead to
the greatest benefits, but also poses the greatest risk. The most prominent risk
is the advancement of AI for its implementation in autonomous weapons
systems- machines that can arguably be used to take warfare to an
unprecedented scale. While these weapons can be used to improve accuracy,
efficiency, and in a capacity of self-defense, the technology, left unregulated,
poses the biggest threat to security and the future of our world. The World
Economic Forum (WEF) argues that future global governance over these AI-
based weapons systems will depend upon “the rules, norms, standards,
incentives, institutions, and other mechanisms that shape the development and
BGF Cyber Security Day Symposium – Common Good Digital Framework
8
deployment of each particular technology”. Cooperative, innovative efforts
towards the development of progressive international norms and forward-
thinking agreements are absolutely critical for the future of global governance of
AI and autonomous weapons development.
The advancement and integration of AI also poses a significant threat in
exacerbating existing biases. For example, AI used in facial recognition
technology (FRT) has proven to be disproportionally inaccurate when identifying
African Americans as compared to whites. In a study done by Joy Buolamiwini,
a leading researcher challenging bias in decision making software, error rates,
made up of mismatches and no registering of a face, for leading FR algorithms
were significantly higher for people of color, particularly black females, than
whites. In the study, the skin tones were classified as follows: people of color
were classified as darker, whites were classified as lighter, women of color were
classified as darker females, white women were classified as lighter females,
etc. Microsoft’s MSFT had an error rate of 12.9% for darker skin tones, 20.8%
for darker females, and only a .7% error rate for lighter skin tones (. Face++
completed the trial with an error rate of16.5% for darker IDs, 34.5% for darker
females, and 4.7% for lighter IDs. Lastly, IBM’s software had error rates of
22.4% for darker skin tones, a significant 34.5%error rate for darker females,
and for lighter skin tones a 3.2% error rate.
Some scholars attribute the algorithmic shortcomings and bias to the lack of
diversity in the data training sets for the FRT and lack of representation of
minorities in the stem field in general. Lastly, aggravating the situation, the
federal and state mugshot databases used for FR have a higher number of
minority -African American, Latino, and immigrant- headshots than white
headshots. As one scholar notes, the FRT will be overused and underperform
on people of color.
In sum, for these reasons, the Common Good Digital Framework will identify
both good and poor digital practices to advocate for ethical guidelines,
frameworks, and policy. This will create new norms, raising the sector ethos,
and benefitting the common good. With this, security and trust will be increased
for all of humanity.

More Related Content

What's hot

disinformation risk management: leveraging cyber security best practices to s...
disinformation risk management: leveraging cyber security best practices to s...disinformation risk management: leveraging cyber security best practices to s...
disinformation risk management: leveraging cyber security best practices to s...Sara-Jayne Terp
 
Cyber Civil Defense - Risk Masters - Allan Cytryn
Cyber Civil Defense - Risk Masters - Allan CytrynCyber Civil Defense - Risk Masters - Allan Cytryn
Cyber Civil Defense - Risk Masters - Allan CytrynBoston Global Forum
 
Presentation at COMPACT Project event in Riga - Disinformation, Media literac...
Presentation at COMPACT Project event in Riga - Disinformation, Media literac...Presentation at COMPACT Project event in Riga - Disinformation, Media literac...
Presentation at COMPACT Project event in Riga - Disinformation, Media literac...Oles Kulchytskyy
 
Cyber savvy (2)
Cyber savvy (2)Cyber savvy (2)
Cyber savvy (2)naveen p
 
Ci2 cyber insurance presentation
Ci2 cyber insurance presentationCi2 cyber insurance presentation
Ci2 cyber insurance presentationEthan S. Burger
 
Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Wendy Qi
 
Mass media and communication
Mass media and communication Mass media and communication
Mass media and communication NiraliMakvana1
 
Global Partnership Key to Cyber Security
Global Partnership Key to Cyber SecurityGlobal Partnership Key to Cyber Security
Global Partnership Key to Cyber SecurityDominic Karunesudas
 
Online radicalisation: work, challenges and future directions
Online radicalisation: work, challenges and future directionsOnline radicalisation: work, challenges and future directions
Online radicalisation: work, challenges and future directionsMiriam Fernandez
 
NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANG...
NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANG...NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANG...
NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANG...IJMIT JOURNAL
 
Research seminar Queen Mary University of London (CogSci)
Research seminar Queen Mary University of London (CogSci)Research seminar Queen Mary University of London (CogSci)
Research seminar Queen Mary University of London (CogSci)Miriam Fernandez
 
IGF Hyderabad - Index of Global Internet Freedom
IGF Hyderabad - Index of Global Internet FreedomIGF Hyderabad - Index of Global Internet Freedom
IGF Hyderabad - Index of Global Internet FreedomFreedom House
 
How does fakenews spread understanding pathways of disinformation spread thro...
How does fakenews spread understanding pathways of disinformation spread thro...How does fakenews spread understanding pathways of disinformation spread thro...
How does fakenews spread understanding pathways of disinformation spread thro...Araz Taeihagh
 
Marriage of Cyber Security with Emergency Management
Marriage of Cyber Security with Emergency ManagementMarriage of Cyber Security with Emergency Management
Marriage of Cyber Security with Emergency ManagementDavid Sweigert
 
Social Media as a Record for Public Services and Utilities in a Disaster
Social Media as a Record for Public Services and Utilities in a DisasterSocial Media as a Record for Public Services and Utilities in a Disaster
Social Media as a Record for Public Services and Utilities in a DisasterAndrew Steinitz
 
Guideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital EconomyGuideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital EconomySettapong_CyberSecurity
 

What's hot (20)

disinformation risk management: leveraging cyber security best practices to s...
disinformation risk management: leveraging cyber security best practices to s...disinformation risk management: leveraging cyber security best practices to s...
disinformation risk management: leveraging cyber security best practices to s...
 
8th Milestones meeting: Cyber violence roundtable
8th Milestones meeting: Cyber violence roundtable8th Milestones meeting: Cyber violence roundtable
8th Milestones meeting: Cyber violence roundtable
 
Cyber Civil Defense - Risk Masters - Allan Cytryn
Cyber Civil Defense - Risk Masters - Allan CytrynCyber Civil Defense - Risk Masters - Allan Cytryn
Cyber Civil Defense - Risk Masters - Allan Cytryn
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
Presentation at COMPACT Project event in Riga - Disinformation, Media literac...
Presentation at COMPACT Project event in Riga - Disinformation, Media literac...Presentation at COMPACT Project event in Riga - Disinformation, Media literac...
Presentation at COMPACT Project event in Riga - Disinformation, Media literac...
 
8th Milestones meeting: Cyber violence roundtable
8th Milestones meeting: Cyber violence roundtable8th Milestones meeting: Cyber violence roundtable
8th Milestones meeting: Cyber violence roundtable
 
Cyber savvy (2)
Cyber savvy (2)Cyber savvy (2)
Cyber savvy (2)
 
Delusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceoDelusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceo
 
Ci2 cyber insurance presentation
Ci2 cyber insurance presentationCi2 cyber insurance presentation
Ci2 cyber insurance presentation
 
Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010Internet Content Regulation: What it means in 2010
Internet Content Regulation: What it means in 2010
 
Mass media and communication
Mass media and communication Mass media and communication
Mass media and communication
 
Global Partnership Key to Cyber Security
Global Partnership Key to Cyber SecurityGlobal Partnership Key to Cyber Security
Global Partnership Key to Cyber Security
 
Online radicalisation: work, challenges and future directions
Online radicalisation: work, challenges and future directionsOnline radicalisation: work, challenges and future directions
Online radicalisation: work, challenges and future directions
 
NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANG...
NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANG...NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANG...
NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANG...
 
Research seminar Queen Mary University of London (CogSci)
Research seminar Queen Mary University of London (CogSci)Research seminar Queen Mary University of London (CogSci)
Research seminar Queen Mary University of London (CogSci)
 
IGF Hyderabad - Index of Global Internet Freedom
IGF Hyderabad - Index of Global Internet FreedomIGF Hyderabad - Index of Global Internet Freedom
IGF Hyderabad - Index of Global Internet Freedom
 
How does fakenews spread understanding pathways of disinformation spread thro...
How does fakenews spread understanding pathways of disinformation spread thro...How does fakenews spread understanding pathways of disinformation spread thro...
How does fakenews spread understanding pathways of disinformation spread thro...
 
Marriage of Cyber Security with Emergency Management
Marriage of Cyber Security with Emergency ManagementMarriage of Cyber Security with Emergency Management
Marriage of Cyber Security with Emergency Management
 
Social Media as a Record for Public Services and Utilities in a Disaster
Social Media as a Record for Public Services and Utilities in a DisasterSocial Media as a Record for Public Services and Utilities in a Disaster
Social Media as a Record for Public Services and Utilities in a Disaster
 
Guideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital EconomyGuideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital Economy
 

Similar to COMMON GOOD DIGITAL FRAMEWORK

Aiws presentation leeper rebecca
Aiws presentation leeper rebeccaAiws presentation leeper rebecca
Aiws presentation leeper rebeccaBoston Global Forum
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sDr Lendy Spires
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyShiva Bissessar
 
Marsden regulating disinformation Brazil 2020
Marsden regulating disinformation Brazil 2020Marsden regulating disinformation Brazil 2020
Marsden regulating disinformation Brazil 2020Chris Marsden
 
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014
 
wp-us-cities-exposed-industries-and-ics
wp-us-cities-exposed-industries-and-icswp-us-cities-exposed-industries-and-ics
wp-us-cities-exposed-industries-and-icsNumaan Huq
 
wp-us-cities-exposed-industries-and-ics
wp-us-cities-exposed-industries-and-icswp-us-cities-exposed-industries-and-ics
wp-us-cities-exposed-industries-and-icsThomas Hughes
 
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...sabrangsabrang
 
Project 2020 Scenarios for the Future of.docx
Project 2020 Scenarios for the Future of.docxProject 2020 Scenarios for the Future of.docx
Project 2020 Scenarios for the Future of.docxbriancrawford30935
 
Global Commision on Internet Governance
Global Commision on Internet GovernanceGlobal Commision on Internet Governance
Global Commision on Internet GovernanceDominic A Ienco
 
[2018] Tech Trends For Journalism and Media – The Future Today Institute
[2018] Tech Trends For Journalism and Media – The Future Today Institute[2018] Tech Trends For Journalism and Media – The Future Today Institute
[2018] Tech Trends For Journalism and Media – The Future Today InstituteFilipp Paster
 
Brian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docxBrian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docxhartrobert670
 
wp-us-cities-exposed
wp-us-cities-exposedwp-us-cities-exposed
wp-us-cities-exposedNumaan Huq
 
CybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTCybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTAimee Shuck
 
HIMSS seeks HIPAA Cybersecurity Framework clarifications from NIST
HIMSS seeks HIPAA Cybersecurity Framework clarifications from NISTHIMSS seeks HIPAA Cybersecurity Framework clarifications from NIST
HIMSS seeks HIPAA Cybersecurity Framework clarifications from NISTDavid Sweigert
 
AI NOW REPORT 2018
AI NOW REPORT 2018AI NOW REPORT 2018
AI NOW REPORT 2018Peerasak C.
 
Blockchain Technology and COVID19
Blockchain Technology and COVID19Blockchain Technology and COVID19
Blockchain Technology and COVID19Ahmed Banafa
 

Similar to COMMON GOOD DIGITAL FRAMEWORK (20)

Aiws presentation leeper rebecca
Aiws presentation leeper rebeccaAiws presentation leeper rebecca
Aiws presentation leeper rebecca
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
 
Marsden regulating disinformation Brazil 2020
Marsden regulating disinformation Brazil 2020Marsden regulating disinformation Brazil 2020
Marsden regulating disinformation Brazil 2020
 
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
 
wp-us-cities-exposed-industries-and-ics
wp-us-cities-exposed-industries-and-icswp-us-cities-exposed-industries-and-ics
wp-us-cities-exposed-industries-and-ics
 
wp-us-cities-exposed-industries-and-ics
wp-us-cities-exposed-industries-and-icswp-us-cities-exposed-industries-and-ics
wp-us-cities-exposed-industries-and-ics
 
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
2020.10.11 international statement_end-to-end_encryption_and_public_safety_fo...
 
Project 2020 Scenarios for the Future of.docx
Project 2020 Scenarios for the Future of.docxProject 2020 Scenarios for the Future of.docx
Project 2020 Scenarios for the Future of.docx
 
Get Prepared
Get PreparedGet Prepared
Get Prepared
 
Global Commision on Internet Governance
Global Commision on Internet GovernanceGlobal Commision on Internet Governance
Global Commision on Internet Governance
 
Delusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceoDelusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceo
 
[2018] Tech Trends For Journalism and Media – The Future Today Institute
[2018] Tech Trends For Journalism and Media – The Future Today Institute[2018] Tech Trends For Journalism and Media – The Future Today Institute
[2018] Tech Trends For Journalism and Media – The Future Today Institute
 
Brian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docxBrian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docx
 
wp-us-cities-exposed
wp-us-cities-exposedwp-us-cities-exposed
wp-us-cities-exposed
 
CybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTCybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINT
 
HIMSS seeks HIPAA Cybersecurity Framework clarifications from NIST
HIMSS seeks HIPAA Cybersecurity Framework clarifications from NISTHIMSS seeks HIPAA Cybersecurity Framework clarifications from NIST
HIMSS seeks HIPAA Cybersecurity Framework clarifications from NIST
 
AI NOW REPORT 2018
AI NOW REPORT 2018AI NOW REPORT 2018
AI NOW REPORT 2018
 
CTO Cybersecurity Forum 2013 Mario Maniewicz
CTO Cybersecurity Forum 2013 Mario ManiewiczCTO Cybersecurity Forum 2013 Mario Maniewicz
CTO Cybersecurity Forum 2013 Mario Maniewicz
 
Blockchain Technology and COVID19
Blockchain Technology and COVID19Blockchain Technology and COVID19
Blockchain Technology and COVID19
 

More from Boston Global Forum

The Artificial Intelligence Chronicle – Open to feedback 3-6-2020
The Artificial Intelligence Chronicle – Open to feedback  3-6-2020The Artificial Intelligence Chronicle – Open to feedback  3-6-2020
The Artificial Intelligence Chronicle – Open to feedback 3-6-2020Boston Global Forum
 
Hunermund causal inference in ml and ai
Hunermund   causal inference in ml and aiHunermund   causal inference in ml and ai
Hunermund causal inference in ml and aiBoston Global Forum
 
Dark, Beyond Deep: A Paradigm Shift to Cognitive AI with Humanlike Common Sense
Dark, Beyond Deep: A Paradigm Shift to Cognitive AI with Humanlike Common SenseDark, Beyond Deep: A Paradigm Shift to Cognitive AI with Humanlike Common Sense
Dark, Beyond Deep: A Paradigm Shift to Cognitive AI with Humanlike Common SenseBoston Global Forum
 
Generalizing Experimental Results by Leveraging Knowledge of Mechanisms
Generalizing Experimental Results by Leveraging Knowledge of MechanismsGeneralizing Experimental Results by Leveraging Knowledge of Mechanisms
Generalizing Experimental Results by Leveraging Knowledge of MechanismsBoston Global Forum
 
MIT Trust Data Alliance building tomorrow’s smart city data systems
MIT Trust Data Alliance building tomorrow’s smart city data systemsMIT Trust Data Alliance building tomorrow’s smart city data systems
MIT Trust Data Alliance building tomorrow’s smart city data systemsBoston Global Forum
 
Professor Hiroshi ESAKI talks about Internet of Design
Professor Hiroshi ESAKI talks about Internet of DesignProfessor Hiroshi ESAKI talks about Internet of Design
Professor Hiroshi ESAKI talks about Internet of DesignBoston Global Forum
 
Aiws united-nation charter day lecture
Aiws united-nation charter day lectureAiws united-nation charter day lecture
Aiws united-nation charter day lectureBoston Global Forum
 
Aiws g7 summit initiative - official april 25, 2019
Aiws g7 summit initiative - official april 25, 2019Aiws g7 summit initiative - official april 25, 2019
Aiws g7 summit initiative - official april 25, 2019Boston Global Forum
 
Global citizenship education network reconciliation conference in tokyo on se...
Global citizenship education network reconciliation conference in tokyo on se...Global citizenship education network reconciliation conference in tokyo on se...
Global citizenship education network reconciliation conference in tokyo on se...Boston Global Forum
 
Catalog cho bgf g7 summit initaitive 2017
Catalog cho bgf  g7 summit initaitive 2017Catalog cho bgf  g7 summit initaitive 2017
Catalog cho bgf g7 summit initaitive 2017Boston Global Forum
 
Agenda of bgf g7 summit initiatve 2017
Agenda of bgf   g7 summit initiatve 2017Agenda of bgf   g7 summit initiatve 2017
Agenda of bgf g7 summit initiatve 2017Boston Global Forum
 
Second UNESCO Forum on Global Citizenship Education: Building Peaceful and Su...
Second UNESCO Forum on Global Citizenship Education: Building Peaceful and Su...Second UNESCO Forum on Global Citizenship Education: Building Peaceful and Su...
Second UNESCO Forum on Global Citizenship Education: Building Peaceful and Su...Boston Global Forum
 
Education for people and planet: Creating sustainable futures for all
Education for people and planet: Creating sustainable futures for allEducation for people and planet: Creating sustainable futures for all
Education for people and planet: Creating sustainable futures for allBoston Global Forum
 
Global Citizenship Education TOPICS AND LEARNING OBJECTIVES
Global Citizenship Education TOPICS AND LEARNING  OBJECTIVESGlobal Citizenship Education TOPICS AND LEARNING  OBJECTIVES
Global Citizenship Education TOPICS AND LEARNING OBJECTIVESBoston Global Forum
 
Agenda of bgf g7 summit initiatve 2017
Agenda of bgf g7 summit initiatve 2017Agenda of bgf g7 summit initiatve 2017
Agenda of bgf g7 summit initiatve 2017Boston Global Forum
 

More from Boston Global Forum (20)

The Artificial Intelligence Chronicle – Open to feedback 3-6-2020
The Artificial Intelligence Chronicle – Open to feedback  3-6-2020The Artificial Intelligence Chronicle – Open to feedback  3-6-2020
The Artificial Intelligence Chronicle – Open to feedback 3-6-2020
 
Hunermund causal inference in ml and ai
Hunermund   causal inference in ml and aiHunermund   causal inference in ml and ai
Hunermund causal inference in ml and ai
 
Dark, Beyond Deep: A Paradigm Shift to Cognitive AI with Humanlike Common Sense
Dark, Beyond Deep: A Paradigm Shift to Cognitive AI with Humanlike Common SenseDark, Beyond Deep: A Paradigm Shift to Cognitive AI with Humanlike Common Sense
Dark, Beyond Deep: A Paradigm Shift to Cognitive AI with Humanlike Common Sense
 
Generalizing Experimental Results by Leveraging Knowledge of Mechanisms
Generalizing Experimental Results by Leveraging Knowledge of MechanismsGeneralizing Experimental Results by Leveraging Knowledge of Mechanisms
Generalizing Experimental Results by Leveraging Knowledge of Mechanisms
 
Marc Rotenberg AIWS
Marc Rotenberg AIWSMarc Rotenberg AIWS
Marc Rotenberg AIWS
 
MIT Trust Data Alliance building tomorrow’s smart city data systems
MIT Trust Data Alliance building tomorrow’s smart city data systemsMIT Trust Data Alliance building tomorrow’s smart city data systems
MIT Trust Data Alliance building tomorrow’s smart city data systems
 
Professor Hiroshi ESAKI talks about Internet of Design
Professor Hiroshi ESAKI talks about Internet of DesignProfessor Hiroshi ESAKI talks about Internet of Design
Professor Hiroshi ESAKI talks about Internet of Design
 
Aiws united-nation charter day lecture
Aiws united-nation charter day lectureAiws united-nation charter day lecture
Aiws united-nation charter day lecture
 
Aiws g7 summit initiative - official april 25, 2019
Aiws g7 summit initiative - official april 25, 2019Aiws g7 summit initiative - official april 25, 2019
Aiws g7 summit initiative - official april 25, 2019
 
Agenda aiws g7 summit 2019
Agenda aiws g7 summit 2019Agenda aiws g7 summit 2019
Agenda aiws g7 summit 2019
 
Global citizenship education network reconciliation conference in tokyo on se...
Global citizenship education network reconciliation conference in tokyo on se...Global citizenship education network reconciliation conference in tokyo on se...
Global citizenship education network reconciliation conference in tokyo on se...
 
Catalog cho bgf g7 summit initaitive 2017
Catalog cho bgf  g7 summit initaitive 2017Catalog cho bgf  g7 summit initaitive 2017
Catalog cho bgf g7 summit initaitive 2017
 
The digital battle
The digital battleThe digital battle
The digital battle
 
Agenda of bgf g7 summit initiatve 2017
Agenda of bgf   g7 summit initiatve 2017Agenda of bgf   g7 summit initiatve 2017
Agenda of bgf g7 summit initiatve 2017
 
Stride gender
Stride genderStride gender
Stride gender
 
Second UNESCO Forum on Global Citizenship Education: Building Peaceful and Su...
Second UNESCO Forum on Global Citizenship Education: Building Peaceful and Su...Second UNESCO Forum on Global Citizenship Education: Building Peaceful and Su...
Second UNESCO Forum on Global Citizenship Education: Building Peaceful and Su...
 
Global Citizen Network
Global Citizen NetworkGlobal Citizen Network
Global Citizen Network
 
Education for people and planet: Creating sustainable futures for all
Education for people and planet: Creating sustainable futures for allEducation for people and planet: Creating sustainable futures for all
Education for people and planet: Creating sustainable futures for all
 
Global Citizenship Education TOPICS AND LEARNING OBJECTIVES
Global Citizenship Education TOPICS AND LEARNING  OBJECTIVESGlobal Citizenship Education TOPICS AND LEARNING  OBJECTIVES
Global Citizenship Education TOPICS AND LEARNING OBJECTIVES
 
Agenda of bgf g7 summit initiatve 2017
Agenda of bgf g7 summit initiatve 2017Agenda of bgf g7 summit initiatve 2017
Agenda of bgf g7 summit initiatve 2017
 

Recently uploaded

Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 

Recently uploaded (20)

Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

COMMON GOOD DIGITAL FRAMEWORK

  • 1. 1 COMMON GOOD DIGITAL FRAMEWORK Campaign Proposal Data Ductus, Inc. | B.S. Computer Engineering, Northeastern University Software Engineer | Computer Ethics and Data Policy Advocate Rebecca Leeper
  • 2. BGF Cyber Security Day Symposium – Common Good Digital Framework 2 Common Good Digital Framework Action Plan PURPOSE The Common Good Digital Framework (CGDF) will serve as a platform to bring authoritative knowledge and raise awareness about violations of ethical values and standards by governments and large organizations. The platform will monitor and alert against the misuse of Artificial Intelligence (AI), personal data, and neglect of cyber security. The objectives of the campaign are to stimulate and galvanize civil society towards the need to create new norms and regulations, and therein influence public and private AI and cyber policy. FOCUS The CGDF will primarily focus on AI bias, privacy (data security), and cyber security. It will specifically monitor and determine when digital activity and AI misuse violates common values and shared ethical principles and put forth a remediation action plan. In particular, the CGDF will identify areas where there are no regulations and common standards and will propose new courses of action. Secondarily, the CGDF will address and identify good cyber practices
  • 3. BGF Cyber Security Day Symposium – Common Good Digital Framework 3 that can serve as guiding models. Both findings will contribute to the generation of an Ethics and Practice Index designed for policy makers, Chief Technology Officers, and other digital actors. The Framework will examine both public institutions (governments) and private corporations. Some critical governments to observe include China, Estonia, some member states of the European Union, Israel, Japan, Russia, Saudi Arabia, and The United States. In the private sector, companies such as Alibaba, Amazon, Apple, Baidu, Facebook, Google, Microsoft, and Tencent will be prioritized. MONITORING METHOD The campaign will rely primarily on open source resources to stay up to date on digital activity – newspapers, magazines like Wired and Medium, journals and reports of authoritative institutions and news media. Secondarily, participation in key policy meetings, global summits, and international panels will both promote the Framework and provide insight into the digital activities of relevant actors. When possible, interviews will also be pursued, with the goal to create a network of trusted scholarly and practitioner advisors. In due time, the CGDF will form a board of expert advisors and relevant experts that will often be consulted and meet annually. Additionally, it will create a database of knowledge and learned people who can provide counsel and consultation. RESPONSE METHOD In response to identified violations, lack of regulatory frameworks, and the detrimental absence of commonly agreed norms and policies to the public well- being, the CGDF will generate a course of action and a policy recommendation by first reaching out to the relevant stakeholders. The policy recommendation will be circulated to all stakeholders and the CGDF network first for feedback and secondly to encourage corrective action by the offender. For example, should a country be violating its citizens rights, the policy presented may be for other states to apply sanctions or a trade embargo on that country. Following,
  • 4. BGF Cyber Security Day Symposium – Common Good Digital Framework 4 the CGDF will publicly publish the recommendation without disclosing the names of the violators. The purpose of this publication will be to draw public attention to the type of violations already occurring. In a later stage, if no corrective action was pursued, the CGDF will reveal the names of the perpetrators publicly, to be amplified by the CGDF network and its partners. MEANS OF DISTRIBUTION The campaign will utilize social media, a website, and journal publications. PARTNERS Partners will be expected to contribute data and evidence when governments and/or companies violate norms. In response to violations, partners will join together their voices, resources, and platform, serving as change agents and advocates. Professor Denise Garcia of Northeastern University; Professor Woodrow Hartzog of Northeastern University; and CGDF Leader Juan Gallego. The CGDF will also seek to connect other young AIWS leaders and cyber advocates in the world. Potential Future Partners: Professor Stuart Russell, UC Berkley President Joseph Aoun, Northeastern University Dr. Eva-Marie Muller-Stuler, Chief Data Scientist and Leader Data Sceince Centre of Excellence, IBM Sacha Alanoca, AI Policy Researcher at The Future Society Maria Luciana Axente, PWC UK AI Commons Aimee van Wynsberghe. Co-director Foundation for Responsible Robotics Rebecca Distler, World Economic Forum Global Shaper Yolanda Lannquist, Head of Research at The Future Society Irakli Beridze, Head of the Centre for Artificial Intelligence and Robotics, UNICRI
  • 5. BGF Cyber Security Day Symposium – Common Good Digital Framework 5 James Butcher, Committee Member – Global AI & Ethics Initiative – IEEE Representatives from other local and international NGOs ACTION PLAN 1. Identify and assign an enthusiastic person for communications on social media for the CGDF 2. Identify and assign an enthusiastic person for outreach to connect other young people to join and contribute to the CGDF 3. Identify and seek out local and international NGOS to join the CGDF network 4. Identify and seek out relevant scholarly leaders to join the CGDF network 5. Identify and seek out leading cyber industry professionals to join the CGDF network 6. Identify and seek out relevant policymakers to join the CGDF network 7. Identify and seek out relevant conferences 8. Draft a report to present at AIWS Summit April 28-29, 2020 at Harvard University 9. Develop a rollout plan for publications and reports 10. Coordinate the campaign with the celebration of Plymouth 400th
  • 6. BGF Cyber Security Day Symposium – Common Good Digital Framework 6 Importance The extensive use of the cloud, internet, and interconnected networks to manage and control infrastructure and the vulnerabilities associated with connectivity prone to hacking and interference pose significant security threats to human security (or the security and privacy of individuals), but also that of the state, and subsequently the international system, as this cyber domain can no longer be protected and observed by physical boundaries. The expansion extends to all aspects of a state’s activity, including the private and public sectors rapidly adapting to the cloud and cloud computing environment for information storage, the internet being used to manage electric power generation, and the water levels in dams remotely by use of what is known as the Supervisory Control and Data Acquisition (SCADA) systems, and distribution networks for food, water, energy, transportation, healthcare, and financial services also depend heavily on the internet and information technology (IT). Moreover, the military depends on IT for command, control, and logistics, and modern-day weapons depend on GPS networks, and movements and actions of military forces are coordinated through networks that allow for immediate information exchange. This entire domain, which is interlinked with what is known as the critical infrastructure of a state, is highly vulnerable to a cyberattack. Some Attacks on Critical Infrastructure • BlackEnergy3 and CrashOveride : Ukraine Power Grid -2015 and 2016 • DragonFly/Energetic Bear: US Energy companies – 2011-2016 • Triton Attack : Saudi Petrochemical Plant – 2014-2017 • Agent.btz: US military networks – 2008 Some personal data leaks • In 2016, 3 billion Yahoo accounts were hacked in one of the biggest breaches of all time. • In 2016, Uber reported that hackers stole the information of over 57 million riders and drivers. • In 2017, 412 million user accounts were stolen from Friendfinder’s sites. • In 2017, 147.9 million consumers were affected by the Equifax Breach. • According to 2017 statistics, there are over 130 large-scale, targeted breaches in the U.S. per year, and that number is growing by 27 percent per year.
  • 7. BGF Cyber Security Day Symposium – Common Good Digital Framework 7 • 100,000 groups in at least 150 countries and more than 400,000 machines were infected by the Wannacry virus in 2017, at a total cost of around $4 billion. • Attacks involving cryptojacking increased by 8,500 percent in 2017. • In 2017, 5.4 billion attacks by the WannaCry virus were blocked. • There are around 24,000 malicious mobile apps blocked every day. • In 2017, the average number of breached records by country was 24,089. The nation with the most breaches annually was India with over 33k files; the US had 28.5k. • In 2018, Under Armor reported that its “My Fitness Pal” was hacked, affecting 150 million users. • Between January 1, 2005 and April 18, 2018 there have been 8,854 recorded breaches. Other Cybercrime Statistics • Total damage related to cybercrime is projected to hit 6 trillion annually by 2021 • There is a hacker attack every 39 seconds • 60% of Americans have been exposed to fraud schemes • 95 percent of breached records came from three industries in 2016: Government, retail, and technology The Fourth Industrial Revolution (4IR) is rapidly emerging before our very eyes; science and technology are advancing at unprecedented rates that have culminated in what the World Economic Forum’s “Global Risks Report of 2017” calls the “twelve key emerging technologies” (WEF, 2017). Among the twelve, one technology in particular has the potential to transform warfare, impact healthcare, alter humanity and the environment. AI advancements can lead to the greatest benefits, but also poses the greatest risk. The most prominent risk is the advancement of AI for its implementation in autonomous weapons systems- machines that can arguably be used to take warfare to an unprecedented scale. While these weapons can be used to improve accuracy, efficiency, and in a capacity of self-defense, the technology, left unregulated, poses the biggest threat to security and the future of our world. The World Economic Forum (WEF) argues that future global governance over these AI- based weapons systems will depend upon “the rules, norms, standards, incentives, institutions, and other mechanisms that shape the development and
  • 8. BGF Cyber Security Day Symposium – Common Good Digital Framework 8 deployment of each particular technology”. Cooperative, innovative efforts towards the development of progressive international norms and forward- thinking agreements are absolutely critical for the future of global governance of AI and autonomous weapons development. The advancement and integration of AI also poses a significant threat in exacerbating existing biases. For example, AI used in facial recognition technology (FRT) has proven to be disproportionally inaccurate when identifying African Americans as compared to whites. In a study done by Joy Buolamiwini, a leading researcher challenging bias in decision making software, error rates, made up of mismatches and no registering of a face, for leading FR algorithms were significantly higher for people of color, particularly black females, than whites. In the study, the skin tones were classified as follows: people of color were classified as darker, whites were classified as lighter, women of color were classified as darker females, white women were classified as lighter females, etc. Microsoft’s MSFT had an error rate of 12.9% for darker skin tones, 20.8% for darker females, and only a .7% error rate for lighter skin tones (. Face++ completed the trial with an error rate of16.5% for darker IDs, 34.5% for darker females, and 4.7% for lighter IDs. Lastly, IBM’s software had error rates of 22.4% for darker skin tones, a significant 34.5%error rate for darker females, and for lighter skin tones a 3.2% error rate. Some scholars attribute the algorithmic shortcomings and bias to the lack of diversity in the data training sets for the FRT and lack of representation of minorities in the stem field in general. Lastly, aggravating the situation, the federal and state mugshot databases used for FR have a higher number of minority -African American, Latino, and immigrant- headshots than white headshots. As one scholar notes, the FRT will be overused and underperform on people of color. In sum, for these reasons, the Common Good Digital Framework will identify both good and poor digital practices to advocate for ethical guidelines, frameworks, and policy. This will create new norms, raising the sector ethos, and benefitting the common good. With this, security and trust will be increased for all of humanity.