09.06.2016 Views

ICON S Conference 17 – 19 June 2016 Humboldt University Berlin

160606-ICON-S-PROGRAMME

160606-ICON-S-PROGRAMME

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

contractual governance, this can have far reaching<br />

consequences. Algorithms by themselves do not respect<br />

constitutions or human rights; they do not know<br />

the concept of (anti)discrimination.<br />

This is especially relevant in a cross-border context,<br />

as it is already difficult to know how these governance<br />

algorithms affect your immediate (socio-legal) environment<br />

but even harder if the global, cross-border<br />

context is taken into account.<br />

This paper describes the current practice in implementing<br />

“smart contracts” in blockchain environments,<br />

as well as presenting potential alternative approaches.<br />

With regard to current practice and different approaches,<br />

it is then evaluated if there is a difference between<br />

these different approaches with regard to taking account<br />

of otherness and cross-border differences. Finally,<br />

an outlook towards potential further research is<br />

done, leading to a normative part to be drawn from the<br />

lessons of the analysis.<br />

that might breach the right to privacy and other human<br />

rights. Due to the interconnected nature of the Internet,<br />

individuals and groups not specifically targeted by a<br />

cyber operation might see their human rights violated<br />

by this operation.<br />

The present contribution develops a comprehensive<br />

overview on how the various forms of statesponsored<br />

cyber operations might breach the right to<br />

privacy and other human rights. One of the objective is<br />

to demonstrate that even if the right to privacy is mainly<br />

threatened by cyber espionage, the impact on human<br />

rights of other forms of cyber operations should not<br />

be underestimated.<br />

Sanjay Jain: Enabling the information communication<br />

technology: Constitutionalising the right<br />

of accessibility of disabled persons in India<br />

Unless societies embrace principles of accessibility<br />

and universal design across all sectors, including<br />

Information and Communication Technology (ICT), the<br />

normative goal of full participation and social inclusion<br />

of disabled persons is merely a distant dream. This is<br />

true for all States, including India. Examining accessibility<br />

for disabled persons in India reveals a strange<br />

paradox. On the one hand, India is making headway<br />

generally in the arena of science and technology, including<br />

the development, dissemination, and use of<br />

ICTs. At the same time, little progress has been made in<br />

the evolution of accessible and enabling environments<br />

for disabled persons. This paper surveys the status of<br />

disabled persons and their access to ICT in India, assesses<br />

progress undertaken by the Indian government<br />

and the private sector, and considers future avenues for<br />

improvements in the sector. It is divided into 3 sections,<br />

Relationship of Disability and Technology, International<br />

normative regime of accessibility as right and India’s<br />

Legal Landscape.<br />

François Delerue: State-sponsored cyber<br />

operations and human rights<br />

In 2013, the public exposure of the mass surveillance<br />

programs conducted by the USA’s NSA and the<br />

UK’s GCHQ in cooperation with Australia, Canada<br />

and New Zealand, shined the spotlight on espionage<br />

practice in the cyber age. International organizations,<br />

States, NGOs and academics expressed their concerns<br />

about the violation of international law and human<br />

rights law committed through these programs.<br />

The bulk collection of data for mass surveillance or<br />

espionage targeting specific individuals might clearly<br />

violate the right of privacy of the concerned person.<br />

Cyber espionage is however not the only one form of<br />

state-conducted or state-sponsored cyber conducts<br />

Concurring panels 149

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!