Smart Borders, Digital Identity and Big Data


Book Description

In recent years, UN agencies, global tech corporations, states and humanitarian NGOs have invested in surveillance technologies to support migrant communities and streamline their management. This book shows how the new surveillance systems lead to further militarization and securitization of border management.




Smart Borders, Digital Identity and Big Data


Book Description

In recent years, UN agencies, global tech corporations, states and humanitarian NGOs have invested in advanced technologies from smart borders to digital identities to manage migratory movements. These are surveillance technologies that have intensified the militarization of borders and became a testing ground for surveillance capitalism. This book shows how these technologies reproduce structural inequalities and discriminative policies. Korkmaz reveals the way in which they grant extensive powers to states and big tech corporations to control communities. Unpacking the effects of surveillance capitalism on vulnerable populations, this is a much-needed intervention that will be of interest to readers in a range of fields.




Protecting Digital Identity in the Cloud


Book Description

Widespread use of cloud computing and other off-shore hosting and processing arrangements make regulation of cross border data one of the most significant issues for regulators around the world. Cloud computing has made data storage and access cost effective but it has changed the nature of cross border data. Now data does not have to be stored or processed in another country or transferred across a national border in the traditional sense, to be what we consider to be cross border data. Nevertheless, the notion of physical borders and transfers still pervades thinking on this subject. The European Commission (“EC”) is proposing a new global standard for data transfer to ensure a level of protection for data transferred out of the EU similar to that within the EU. This paper examines the two major international schemes regulating cross-border data, the EU approach and the US approach, and the new EC and US proposals for a global standard. These approaches which are all based on data transfer are contrasted with the new Australian approach which regulates disclosure. The relative merits of the EU, US and Australian approaches are examined in the context of digital identity, rather than just data privacy which is the usual focus, because of the growing significance of digital identity, especially to an individual's ability to be recognized and to transact. The set of information required for transactions which invariably consists of full name, date of birth, gender and a piece of what is referred to as identifying information, has specific functions which transform it from mere information. As is explained in this article, as a set, it literally enables the system to transact. For this reason, it is the most important, and most vulnerable, part of digital identity. Yet while it is deserving of most protection, its significance has been largely underappreciated. This article considers the issues posed by cross border data regulation in the context of cloud computing, with a focus on transaction identity and the other personal information which make up an individual's digital identity. The author argues that the growing commercial and legal importance of digital identity and its inherent vulnerabilities mandate the need for its more effective protection which is provided by regulation of disclosure, not just transfer.




Digital Identity, Virtual Borders and Social Media


Book Description

This insightful book discusses how states deploy frontier and digital technologies to manage and control migratory movements. Assessing the development of blockchain technologies for digital identities and cash transfer; artificial intelligence for smart borders, resettlement of refugees and assessing asylum applications; social media and mobile phone applications to track and surveil migrants, it critically examines the consequences of new technological developments and evaluates their impact on the rights of migrants and refugees.




The De Gruyter Handbook of Artificial Intelligence, Identity and Technology Studies


Book Description

The De Gruyter Handbook of Artificial Intelligence, Identity and Technology Studies examines the relationship of the social sciences to artificial intelligence, surveying the various convergences and divergences between science and technology studies on the one hand and identity transformations on the other. It provides representative coverage of all aspects of the AI revolution, from employment to education to military warfare, impacts on public policy and governance and the future of ethics. How is AI currently transforming social, economic, cultural and psychological processes? This handbook answers these questions by looking at recent developments in supercomputing, deep learning and neural networks, including such topics as AI mobile technology, social robotics, big data and digital research. It focuses especially on mechanisms of identity by defining AI as a new context for self-exploration and social relations and analyzing phenomena such as race, ethnicity and gender politics in human-machine interfaces.




Big Data and Global Trade Law


Book Description

An exploration of the current state of global trade law in the era of Big Data and AI. This title is also available as Open Access on Cambridge Core.




Exploring the Boundaries of Big Data


Book Description

In the investigation Exploring the Boundaries of Big Data The Netherlands Scientific Council for Government Policy (WRR) offers building blocks for developing a regulatory approach to Big Data.




All at Sea


Book Description

Maritime migration : a wicked problem / Kathleen Newland -- Case study : unauthorized maritime migration in Europe and the Mediterranean region / Elizabeth Collett -- Case study : unauthorized maritime migration in the Bay of Bengal / Kathleen Newland -- Case study : unauthorized maritime migration in the Gulf of aden and the Red Sea / Kate Hooper -- Case study : the maritime approaches to Australia / Kathleen Newland -- Case study : maritime migration in the United States and the Caribbean / Kathleen Newland and Sarah Flamm




Crossing the Digital Divide


Book Description

Amid a growing global forced displacement crisis, refugees and the organizations that assist them have turned to technology as an important resource in solving problems in humanitarian settings. This report analyzes technology uses, needs, and gaps, as well as opportunities for better using technology to help displaced people and improving the operations of responding agencies.




Digital Identity Management


Book Description

In the past four decades, information technology has altered chains of value production, distribution, and information access at a significant rate. These changes, although they have shaken up numerous economic models, have so far not radically challenged the bases of our society. This book addresses our current progress and viewpoints on digital identity management in different fields (social networks, cloud computing, Internet of Things (IoT), with input from experts in computer science, law, economics and sociology. Within this multidisciplinary and scientific context, having crossed analysis on the digital ID issue, it describes the different technical and legal approaches to protect digital identities with a focus on authentication systems, identity federation techniques and privacy preservation solutions. The limitations of these solutions and research issues in this field are also discussed to further understand the changes that are taking place. Offers a state of the discussions and work places on the management of digital identities in various contexts, such as social networking, cloud computing and the Internet of Things Describes the advanced technical and legal measures to protect digital identities Contains a strong emphasis of authentication techniques, identity federation tools and technical protection of privacy