ICON S Conference 17 – 19 June 2016 Humboldt University Berlin
160606-ICON-S-PROGRAMME
160606-ICON-S-PROGRAMME
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
contractual governance, this can have far reaching<br />
consequences. Algorithms by themselves do not respect<br />
constitutions or human rights; they do not know<br />
the concept of (anti)discrimination.<br />
This is especially relevant in a cross-border context,<br />
as it is already difficult to know how these governance<br />
algorithms affect your immediate (socio-legal) environment<br />
but even harder if the global, cross-border<br />
context is taken into account.<br />
This paper describes the current practice in implementing<br />
“smart contracts” in blockchain environments,<br />
as well as presenting potential alternative approaches.<br />
With regard to current practice and different approaches,<br />
it is then evaluated if there is a difference between<br />
these different approaches with regard to taking account<br />
of otherness and cross-border differences. Finally,<br />
an outlook towards potential further research is<br />
done, leading to a normative part to be drawn from the<br />
lessons of the analysis.<br />
that might breach the right to privacy and other human<br />
rights. Due to the interconnected nature of the Internet,<br />
individuals and groups not specifically targeted by a<br />
cyber operation might see their human rights violated<br />
by this operation.<br />
The present contribution develops a comprehensive<br />
overview on how the various forms of statesponsored<br />
cyber operations might breach the right to<br />
privacy and other human rights. One of the objective is<br />
to demonstrate that even if the right to privacy is mainly<br />
threatened by cyber espionage, the impact on human<br />
rights of other forms of cyber operations should not<br />
be underestimated.<br />
Sanjay Jain: Enabling the information communication<br />
technology: Constitutionalising the right<br />
of accessibility of disabled persons in India<br />
Unless societies embrace principles of accessibility<br />
and universal design across all sectors, including<br />
Information and Communication Technology (ICT), the<br />
normative goal of full participation and social inclusion<br />
of disabled persons is merely a distant dream. This is<br />
true for all States, including India. Examining accessibility<br />
for disabled persons in India reveals a strange<br />
paradox. On the one hand, India is making headway<br />
generally in the arena of science and technology, including<br />
the development, dissemination, and use of<br />
ICTs. At the same time, little progress has been made in<br />
the evolution of accessible and enabling environments<br />
for disabled persons. This paper surveys the status of<br />
disabled persons and their access to ICT in India, assesses<br />
progress undertaken by the Indian government<br />
and the private sector, and considers future avenues for<br />
improvements in the sector. It is divided into 3 sections,<br />
Relationship of Disability and Technology, International<br />
normative regime of accessibility as right and India’s<br />
Legal Landscape.<br />
François Delerue: State-sponsored cyber<br />
operations and human rights<br />
In 2013, the public exposure of the mass surveillance<br />
programs conducted by the USA’s NSA and the<br />
UK’s GCHQ in cooperation with Australia, Canada<br />
and New Zealand, shined the spotlight on espionage<br />
practice in the cyber age. International organizations,<br />
States, NGOs and academics expressed their concerns<br />
about the violation of international law and human<br />
rights law committed through these programs.<br />
The bulk collection of data for mass surveillance or<br />
espionage targeting specific individuals might clearly<br />
violate the right of privacy of the concerned person.<br />
Cyber espionage is however not the only one form of<br />
state-conducted or state-sponsored cyber conducts<br />
Concurring panels 149