Digitale Infrastrukturen in der Demokratie
Dauerhafte URI für die Sammlung
Listen
Auflistung Digitale Infrastrukturen in der Demokratie nach Titel
Gerade angezeigt 1 - 20 von 54
Treffer pro Seite
Sortieroptionen
- ItemAlgorithmen als Rationalitätsmythos(FernUniversität in Hagen, 2020) Keiner, Alexandra; Leineweber, Christian; de Witt, ClaudiaAlgorithmen gelten derzeit als die Antwort auf eine Vielzahl gesellschaftlicher Probleme. Von der Bekämpfung des Klimawandels über die Vorbeugung von Armut und Kriminalität bis hin zur Früherkennung von Krebs – Algorithmen scheinen eine Universallösung zu sein. Mit dem neo-institutionalistischen Konzept rationalisierter Mythen wird in diesem Beitrag versucht, für diese solutionistische Faszination eine Erklärung zu liefern.
- ItemAlgorithmen der Alterität - Alterität der Algorithmen. Überlegungen zu einem komplexen Verhältnis(2023) Berg, Sebastian; Koster, Ann-Kathrin; Matzner, Tobias; Maschewski, Felix; Nosthoff, Anna-Verena
- ItemArtificial muses: Generative Artificial Intelligence Chatbots Have Risen to Human-Level Creativity(2023) Haase, Jennifer; Hanel, Paul H. P.A widespread view is that Artificial Intelligence cannot be creative. We tested this assumption by comparing human-generated ideas with those generated by six Generative Artificial Intelligence (GAI) chatbots: $alpa.\!ai$, $Copy.\!ai$, ChatGPT (versions 3 and 4), $Studio.\!ai$, and YouChat. Humans and a specifically trained AI independently assessed the quality and quantity of ideas. We found no qualitative difference between AI and human-generated creativity, although there are differences in how ideas are generated. Interestingly, 9.4 percent of humans were more creative than the most creative GAI, GPT-4. Our findings suggest that GAIs are valuable assistants in the creative process. Continued research and development of GAI in creative tasks is crucial to fully understand this technology's potential benefits and drawbacks in shaping the future of creativity. Finally, we discuss the question of whether GAIs are capable of being truly creative.
- ItemBeware: Processing of Personal Data—Informed Consent Through Risk Communication(2024) Seiling, Lukas; Gsenger, Rita; Mulugeta, Filmona; Henningsen, Marte; Mischau, Lena; Schirmbeck, MarieThe General Data Protection Regulation (GDPR) has been applicable since May 2018 and aims to further harmonize data protection law in the European Union. Processing personal data based on individuals’ consent is lawful under the GDPR only if such consent meets certain requirements and is “informed,” in particular. However, complex privacy notice design and individual cognitive limitations challenge data subjects’ ability to make elaborate consent decisions. Risk-based communication may address these issues. **Literature review:** Most research focuses on isolated aspects of risk in processing personal data, such as the actors involved, specific events leading to risk formation, or distinctive (context-dependent) consequences. We propose a model combining these approaches as the basis for context-independent risk communication. **Research questions:** 1. What are relevant information categories for risk communication in the processing of personal data online? 2. Which potentially adverse consequences can arise from specific events in the processing of personal data online? 3. How can consequences in the processing of personal data be avoided or mitigated? **Research methodology:** The GDPR was examined through a systematic qualitative content analysis. The results inform the analysis of 32 interviews with privacy, data protection, and information security experts from academia, Non-Governmental Organizations, the public, and the private sector. **Results:** Risk-relevant information categories, specific consequences, and relations between them are identified, along with strategies for risk mitigation. The study concludes with a specified framework for perceived risk in processing personal data. **Conclusion:** The results provide controllers, regulatory bodies, data subjects, and experts in the field of professional communication with information on risk formation in personal data processing. Based on our analysis, we propose information categories for risk communication, which expand the current regulatory information requirements.
- ItemConstitucionalismo Digital: contradições de um conceito impreciso(2022) Pereira, Jane Reis Gonçalves; Iglesias Keller, ClaraResumo O presente artigo mapeia os usos da expressão constitucionalismo digital, empregada nas discussões recentes de regulação de tecnologias digitais e, em especial, plataformas de Internet. Nosso objetivo principal é indicar as contradições e riscos colocados na dilatação do termo “constitucionalismo” para englobar os fenômenos normativos que hoje correm sob o rótulo. À luz da compreensão do constitucionalismo tradicional como fenômeno político e institucional, são identificadas as teorias que precedem o constitucionalismo digital como formulações contemporâneas que visam explicar as mudanças no funcionamento dos poderes e sistemas normativos que ultrapassam ou sobrepõem o estado-nação e seus limites territoriais (i.e., pluralismo constitucional, constitucionalismo societal e constitucionalismo global). A partir das críticas da literatura a essa matriz teórica, o constitucionalismo digital é problematizado como termo epistemicamente prejudicado pela diversidade de aplicações e pelo potencial de legitimação de concentração de poderes privados. , Abstract This paper maps the uses of the expression digital constitutionalism, as employed in recent debates about digital technologies regulation (in particular, digital platforms). Our goal is to highlight discrepancies and risks implied in the dilatation of the term "constitutionalism" to encompass the normative phenomena that run under this label. In light of the understanding of traditional constitutionalism as a political and institutional phenomenon, we identify the theories that precede digital constitutionalism as contemporary formulations aimed at explaining changes in the functioning of powers and normative systems that transcend or overlap the nation-state and its territorial boundaries (i.e., constitutional pluralism, societal constitutionalism, and global constitutionalism). Based on the literature's criticism of this theoretical matrix, digital constitutionalism is problematized as a term epistemically impaired by the diversity of applications and the potential to legitimize concentrations of private powers.
- ItemDemocratic legitimacy in global platform governance(2021) Haggart, Blayne; Iglesias Keller, ClaraThe goal of this paper is to propose a democratic legitimacy framework for evaluating platform-goverance proposals, and in doing so clarify terms of debate in this area, allowing for more nuanced policy assessments. It applies a democratic legitimacy framework originally created to assess the European Union's democratic bona fides – Vivian Schmidt's (2013) modification of Scharpf's (1999) well-known taxonomy of forms of democratic legitimacy – to various representative platform governance proposals and policies. The first section discusses briefly the issue of legitimacy in internet and platform governance, while the second outlines our analytical framework. The second section describes the three forms of legitimacy that, according to this framework, are necessary for democratic legitimation: input, throughput and output legitimacy. The third section demonstrates our framework's utility by applying it to four paradigmatic proposals/regimes: Facebook's Oversight Board (self-governance regimes); adjudication-focused proposals such as the Manila Principles for Intermediary Liability (rule-of-law-focused regimes); the human-rights-focused framework proposed by then-UN Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression; and the United Kingdom's Online Harms White Paper (domestic regime). Section four describes our four main findings regarding the case studies: non-state proposals seem to focus on throughput legitimacy; input legitimacy requirements are frequently under examined; state regulation is usually side-lined as a policy option; and output legitimacy is a limited standard to be adopted in supranational contexts. We conclude that only by considering legitimacy as a multifaceted phenomenon based in democratic accountability will it be possible to design platform-governance models that will not only stand the test of time, but will also be accepted by the people whose lives they affect.
- ItemDie genetische Ressource als Immaterialgut(2023) Klünker, IrmaAccess and Benefit-Sharing ist ein Mechanismus aus dem Biodiversitätsrecht, nach dem der Zugang zu genetischen Ressourcen der vorherigen Zustimmung bedarf und die Vorteile aus der Nutzung der genetischen Ressourcen ausgewogen und gerecht geteilt werden sollen. Die genetische Ressource als Gegenstand des Access and Benefit-Sharings wird bislang in der Literatur sowohl durch informationelle Eigenschaften als auch solche körperlicher Güter charakterisiert. Gleichzeitig bleibt das Access and Benefit-Sharing hinter den Erwartungen zurück, insbesondere beim Beitrag zur Erhaltung der Biodiversität. Ein Vergleich der genetischen Ressource mit Immaterialgütern könnte jedoch Ansätze für Reformen im Access and Benefit-Sharing aufzeigen. Dazu wird zunächst das Access and Benefit-Sharing als Güterzuweisungsproblem dargestellt. Anschließend wird die genetische Ressource auf die Eigenschaften von Immaterialgütern untersucht, namentlich die Nicht-Rivalität, die Kopierbarkeit und die Abstraktion der genetischen Information vom Trägermaterial. Trotz Ähnlichkeiten zwischen der genetischen Ressource und Immaterialgütern in diesen Eigenschaften ist eine Zuweisung von genetischen Ressourcen durch ein Immaterialgüterrecht de lege ferenda nicht gerechtfertigt. Dennoch können aus dem Vergleich Ansätze für eine Neugestaltung des Access and Benefit-Sharings gewonnen werden.
- ItemDie Tragödie des Access and Benefit-Sharings: Nutzungsregeln für genetische Ressourcen und digitale Sequenzinformation(Universität Trier, 2024) Klünker, IrmaMehr als eine Million Arten sind vom Aussterben bedroht. Die Bilanz des Access and Benefit-Sharings mehr als 30 Jahre nach Unterzeichnung der Biodiversitätskonvention ist jedoch ernüchternd. Die vorliegende Dissertation zeigt mittels einer ökonomischen Analyse des Rechts, warum unter dem derzeitigen Property-Rights-Ansatz bislang kaum monetäre Vorteile aus der Nutzung von genetischen Ressourcen geteilt wurden. Stattdessen droht angesichts des aktuell verhandelten Access and Benefit-Sharings an digitaler Sequenzinformation eine Tragödie der Anticommons, also eine Unternutzung von genetischer Information. Als Lösung schlägt die Arbeit eine Kombination aus Property und Liability Rules für genetische Ressourcen und digitale Sequenzinformation vor, die eine Nutzung ermöglichen und gleichzeitig einen Vorteilsausgleich sicherstellen.
- ItemDigital Sequence Information between Benefit-Sharing and Open Data(2022) Klünker, Irma; Richter, HeikoCurrently, parties to the Convention on Biological Diversity (CBD) are negotiating a strategic plan to save biodiversity. One crucial element of an agreement is the question of whether and how digital sequence information (DSI) is subject to access and benefit-sharing from the utilization of genetic resources, one main instrument of the CBD. In the EU, the Open Data Directive (ODD) of 2019 and the recently adopted Data Governance Act (DGA) already cover research data and to some extent DSI. An analysis of the ODD and the DGA throws a spotlight on the legal uncertainty of utilizing DSI and reveals systemic tensions between open data principles and benefit-sharing restrictions on non-commercial use. It also suggests that a future benefit-sharing mechanism for DSI should avoid distinguish- ing between commercial and non-commercial use upstream, but should instead favor a solution, which imposes benefit-sharing obligations further downstream or outside of the DSI life cycle.
- ItemDon’t Shoot the Message: Regulating Disinformation Beyond Content(2021) Iglesias Keller, ClaraThis paper approaches regulatory strategies against disinformation with two main goals: (i) exploring the policies recently implemented in different legal contexts to provide insight into both the risks they pose to free speech and their potential to address the rationales that motivated them, and (ii) to do so by bridging policy debates and recent social and communications studies findings on disinformation. An interdisciplinary theoretical framework informs both the paper’s scope (anchored on understandings of regulatory strategies and of disinformation) and the analysis of the legitimate motivations for states to establish statutory regulation that aims at disinformation. Departing from this analysis, I suggest an organisation of recently implemented and proposed policies into three groups based on their regulatory target: content, data, and structure. Combining the analysis of these three types of policies with the theoretical framework, I will argue that, in the realm of statutory regulation that aims at disinformation. Departing from this analysis, I suggest an organisation of recently implemented and proposed policies into three groups based on their regulatory target: content, data, and structure. Combining the analysis of these three types of policies with the theoretical framework, I will argue that, in the realm of statutory regulation, state action is better off targeted at data or structure, as aiming at content represents disproportional risks to freedom of expression. Furthermore, content targeted regulation shows little potential to address the structural transformations on the public sphere of communications that, among other factors, influence current practices of production and spread of disinformation.
- ItemEinleitung: Entscheidungsträger im Internet: Private Entscheidungsstrukturen und Plattformregulierung(Nomos, 2022) Schrör, Simon; Keiner, Alexandra; Müller, Ferdinand; Schumacher, Pablo; Schrör, Simon; Keiner, Alexandra; Müller, Ferdinand; Schumacher, Pablo
- ItemEinsatz von KI in der Medizin: Haftung und Versicherung(2023) Zech, Herbert; Hünefeld, Isabelle CélineDer zunehmende Einsatz von künstlicher Intelligenz (KI) in der Medizin gibt Anlass, das Verhältnis von Arzthaftung (Behandelndenhaftung) und KI-Haftung näher zu beleuchten. Dabei sind drei grundsätzliche Arten der Risikozuweisung zu unterscheiden: Die Risikotragung durch die Patienten bzw. Sozialversicherungen als Ausgangspunkt, die Risikotragung durch die Behandelnden (Behandelndenhaftung), sowie die Risikotragung durch die Hersteller bzw. Betreiber der KI (KI-Haftung). Um die rechtliche Risikozurechnung beim Einsatz von KI in der Medizin darzustellen, wird zunächst kurz das allgemeine Risikopotenzial beim Einsatz von KI in der Medizin dargestellt (I.), um sodann die drei wesentlichen Zurechnungspole zu beleuchten, nämlich die Behandlungsrisiken, KI-Risiken und Patientenrisiken (II.), wobei die wesentlichen Risikoquellen sowie die Risikoverteilung im Allgemeinem überblicksartig dargestellt werden. Darauf aufbauend werden drei grundlegende Mechanismen der rechtlichen Risikozurechnung dargestellt: Zunächst wird das Arzthaftungsrecht als klassischer Risikoverteilungsmechanismus bei medizinischen Behandlungen aufgezeigt, das über eine Risikotragung durch den Behandelnden oder durch den Patienten (bzw. dessen Versicherung) entscheidet (III.). Sodann wird das bei KI-Sachverhalten hinzutretende KI-Haftungsrecht dargestellt, das zwischen einer Risikotragung durch die Hersteller, durch die Betreiber oder durch die Betroffenen unterscheidet (IV.). Zuletzt wird im Rahmen der besonderen Patientenrisiken gezeigt, welche Möglichkeiten einer Vergemeinschaftung von Risiken sowohl bei Behandlungsrisiken als auch bei KI-Risiken diskutiert werden (V.). Es wird deutlich, dass die Haftung de lege lata bereits zu einer angemessenen Risikoverteilung führt, es durch die Einführung neuer KI-Haftungsregelungen de lege ferenda aber zu einer Verschiebung der Risikotragung hin zu den Herstellern von KI-Systemen kommen könnte.
- ItemEnhancing decision-making of IT demand management with process mining(2023) Novak, Christian; Pfahlsberger, Lukas; Bala, Saimir; Revoredo, Kate; Mendling, JanPurpose Digitalization, innovation and changing customer requirements drive the continuous improvement of an organization's business processes. IT demand management (ITDM) as a methodology supports the holistic governance of IT and the corresponding business process change (BPC), by allocating resources to meet a company's requirements and strategic objectives. As ITDM decision-makers are not fully aware of how the as-is business processes operate and interact, making informed decisions that positively impact the to-be process is a key challenge. Design/methodology/approach In this paper, the authors address this challenge by developing a novel approach that integrates process mining and ITDM. To this end, the authors conduct an action research study where the researchers participated in the design, creation and evaluation of the approach. The proposed approach is illustrated using two sample demands of an insurance claims process. These demands are used to construct the artefact in multiple research circles and to validate the approach in practice. The authors applied learning and reflection methods for incrementally adjusting this study’s approach. Findings The study shows that the utilization of process mining activities during process changes on an operational level contributes to (1) increasing accuracy and efficiency of ITDM; (2) timely identification of potential risks and dependencies and (3) support of testing and acceptance of IT demands. Originality/value The implementation of this study’s approach improved ITDM practice. It appropriately addressed the information needs of decision-makers and unveiled the effects and consequences of process changes. Furthermore, providing a clearer picture of the process dependencies clarified the responsibilities and the interfaces at the intra- and inter-process level.
- ItemEntscheidungsträger im Internet: Private Entscheidungsstrukturen und Plattformregulierung(Nomos, 2022) Schrör, Simon; Keiner, Alexandra; Müller, Ferdinand; Schumacher, PabloSoziale Netzwerke, Zahlungsdienste, Gaming-Plattformen – sie alle verfügen über ausdifferenzierte Regelwerke zur Nutzung ihrer Angebote. Ebenso komplex sind die Systeme, mit denen diese privaten Akteure ihre Regeln durchsetzen. Automatisierte, menschliche oder hybride Entscheidungsstrukturen sollen eine effiziente und gerechte Regeldurchsetzung gewährleisten. Auf Grund der hohen Relevanz dieser Plattformen versuchen aktuelle Regulierungsvorhaben wie der Digital Services Act für klare Vorgaben bei diesen privaten Entscheidungsstrukturen zu sorgen. Der Band versammelt empirische und theoretische Beiträge, die Fragen der Institutionalisierung, Legitimität und Konsequenzen dieser Entwicklung auf den Grund gehen.
- ItemFrom the Beginning: Key Transitions in the First 15 Years of DNSSEC(2022) Osterweil, Eric; Tehrani, Pouyan Fotouhi; Schmidt, Thomas C.; Wahlisch, MatthiasWhen the global rollout of the DNS Security Extensions (DNSSEC) began in 2005, a first-of-its-kind trial started: The complexity of a core Internet protocol was magni- fied in favor of better security for the overall Internet. Thereby, the scale of the loosely-federated delegation in DNS became an unprecedented cryptographic key management challenge. Though fundamental for current and future operational success, our community lacks a clear notion of how to empirically eval- uate the process of securely transitioning keys. In this paper, we propose two building blocks to formally characterize and assess key transitions. First, the anatomy of key transitions, i.e., mea- surable and well-defined properties of key changes; and second, a novel classification model based on this anatomy for describing key transition practices in abstract terms. This abstraction allows for classifying operational behavior. We apply our proposed transition anatomy and transition classes to describe the global DNSSEC deployment. Specifically, we use measurements from the first 15 years of the DNSSEC rollout to detect and under- stand which key transitions have been used to what degree and which rates of errors and warnings occurred. In contrast to prior work, we consider all possible transitions and not only 1:1 key rollovers. Our results show measurable gaps between prescribed key management processes and key transitions in the wild. We also find evidence that such noncompliant transitions are needed in operations.
- ItemGenerating impactful situated explanations through digital trace data(2024) Grisold, Thomas; Kremser, Waldemar; Mendling, Jan; Recker, Jan; Vom Brocke, Jan; Wurm, BastianProgressively, information systems (IS) researchers draw on digital trace data to capture the emergent dynamics of today’s digitalized world. Digital trace data enable researchers to generate highly context-specific insights into the features and dynamics of socio-technical phenomena. We suggest how IS researchers can use digital trace data to develop situated explanations, that is, explanations that capture the idiosyncratic features of real-world problems in order to generate impactful solutions to these problems. We outline five key principles to build situated explanations based on digital trace data. We make several suggestions on how the information system field can adjust its research and publication practices to embrace the development and dissemination of situated explanations.
- ItemHandling the hype: Implications of AI hype for public interest tech projects(2023) Züger, Theresa; Kuper, Freia; Fassbender, Judith; Katzy-Reinshagen, Anna; Kühnlein, IrinaBased on theories of expectations of technology and empirical data from expert interviews and case studies, this research article explores how actors in the field of public interest technologies relate to and within the dynamics of AI hype. On an affirmative note, practitioners and experts see the potential that AI hype can serve their own purposes, e.g., through improved funding and support structures. At the same time, public interest tech actors distance themselves from the dynamics of AI hype and criticize it explicitly. Finally, the article discusses how engagement with AI hype and its impact affects society as a whole and, more specifically, society’s ability to develop and use technologies in response to societal problems.
- ItemHarmonize rules for digital sequence information benefit-sharing across UN frameworks(2024) Sett, Scarlett; Kress, W. John; Halewood, Michael; Nicholson, David; Nuñez-Vega, Genuar; Faggionato, Davide; Rouard, Mathieu; Jaspars, Marcel; Da Silva, Manuela; Prat, Christine; Raposo, Debora S.; Klünker, Irma; Freitag, Jens; Tiambo Keambou, Christian; Dos Santos Ribeiro, Carolina; Wong, Linda; Benbouza, Halima; Overmann, Jörg; Hartman Scholz, AmberAs multiple UN fora develop parallel rules for sharing benefits from digital sequence information, we urge better coordination. International policymakers should focus on harmonizing new benefit-sharing rules to ensure open access to data, database interoperability, and better benefit sharing outcomes.
- ItemIdea generation in exploitative and explorative business process redesign techniques(2024) Groß, Steven; Grisold, Thomas; Mendling, Jan; Haase, JenniferBusiness process redesign has received considerable attention in research and practice. An important task contributing to redesign is idea generation. It has been argued that the choice of technique influences redesign outcomes, but empirical evidence is largely missing. In this paper, we examine the role of idea generation in business process redesign by comparing two different kinds of techniques: exploitative and explorative redesign techniques. Often, exploitative techniques are expected to yield more appropriate solutions, while explorative techniques are associated with more creative outcomes. To investigate such propositions, we consider the Best Practices of Process Redesign as an example of an exploitative redesign technique and the Business Process Design Space as an explorative redesign technique. We conducted a free-simulation experiment to study the empirical impact of the choice of redesign techniques on outcomes. We find that the Business Process Design Space leads to a higher number of redesign ideas, which are also more diverse. These are more creative and novel than ideas produced by the Best Practices of Process Redesign. Against expectation, the best practices as an exploitative approach do not produce more appropriate nor impactful ideas in our task design. Since both approaches cover different areas of improvement, a key implication of our work is that they should not be seen as isolated approaches to redesign; rather, they should be purposefully combined to not only create novel but also operational business process redesigns.
- ItemIm Maschinenraum politischer Repräsentation: Über den Umgang mit politischen Grundbegriffen in der digitalen Konstellation(Nomos, 2023) Berg, Sebastian; Adler-Bartels, Tobias; Altenburger, Sven; Frick, Verena; Schottdorf, Tobias; Stein, Tine
- «
- 1 (current)
- 2
- 3
- »