4.4. Democracy-Affirming Technologies
Download PDF
4.4. Democracy-Affirming Technologies
Use the future to build the present
Democracy-Affirming Technologies
Comment
Stakeholder Type
1.1Advanced AI1.2QuantumRevolution1.3UnconventionalComputing1.4AugmentedReality1.5CollectiveIntelligence2.1CognitiveEnhancement2.2HumanApplicationsof GeneticEngineering2.3HealthspanExtension2.4ConsciousnessAugmentation2.5Organoids2.6FutureTherapeutics3.1Decarbonisation3.2EarthSystemsModelling3.3FutureFoodSystems3.4SpaceResources3.5OceanStewardship3.6SolarRadiationModification3.7InfectiousDiseases4.1Science-basedDiplomacy4.2Advancesin ScienceDiplomacy4.3Foresight,Prediction,and FuturesLiteracy4.4Democracy-affirmingTechnologies5.1ComplexSystemsScience5.2Futureof Education5.3Future Economics,Trade andGlobalisation5.4The Scienceof theOrigins of Life5.5SyntheticBiology
1.1Advanced AI1.2QuantumRevolution1.3UnconventionalComputing1.4AugmentedReality1.5CollectiveIntelligence2.1CognitiveEnhancement2.2HumanApplicationsof GeneticEngineering2.3HealthspanExtension2.4ConsciousnessAugmentation2.5Organoids2.6FutureTherapeutics3.1Decarbonisation3.2EarthSystemsModelling3.3FutureFoodSystems3.4SpaceResources3.5OceanStewardship3.6SolarRadiationModification3.7InfectiousDiseases4.1Science-basedDiplomacy4.2Advancesin ScienceDiplomacy4.3Foresight,Prediction,and FuturesLiteracy4.4Democracy-affirmingTechnologies5.1ComplexSystemsScience5.2Futureof Education5.3Future Economics,Trade andGlobalisation5.4The Scienceof theOrigins of Life5.5SyntheticBiology

Emerging Topic:

4.4Democracy-Affirming Technologies

    Associated Sub-Fields

    The Democracy Index, as measured by the Economist Intelligence Unit, has recorded a snapshot of global democracy every year since 2006. Its latest report for 2021 suggests that 45.7 per cent of the world's population live in a democracy, a significant drop from 49.4 per cent the year before.1 This is one, but by no means the only, indication that democracy is in decline.

    One factor playing an increasingly important role in the processes of democracy is digital technology, which can enhance or diminish it, depending on how it is used. And that raises important questions about the impact and potential of today's technologies and those in the pipeline. Their influence operates at all scales.

    At the individual scale is the issue of personal identity in a digital world: how it can be best captured, verified, protected and used. At the scale of communities and societies are digital technologies that can influence the nature of governance and even anticipate and manipulate it. These technologies have the potential to profoundly alter our relationship with democracy in unanticipated ways.

    All this sits within a broader debate about the veracity of information, and how to identify and counter misinformation. The ways in which information can and should be moderated is a topic of significant debate, with much agreement that misinformation and hate speech cannot be allowed to spread largely unfettered, as they do today. But moderation must be carefully managed to permit secure, anonymous communication, particularly for whistle blowers and in authoritarian regimes where free speech is stifled.

    The decline in global democracy has puzzled many political scientists who have tended to think of democratic change as an ever-increasing process. But recent research has begun to treat democracies as complex systems that are vulnerable to unexpected and unpredictable change.2 Many researchers working in this field are keen to better understand the role that technologies will play in the operation of democratic societies, as well as the philosophies and frameworks necessary for them to be put to best use.

    SELECTION OF GESDA BEST READS AND KEY REPORTS:

    In May 2023, Alexandra Giannopoulou, researcher at the University of Amsterdam, shared Digital Identity Infrastructures: a Critical Approach of Self-Sovereign Identity, which delves into the evolving landscape of digital identity, focusing on the promises and pitfalls of self-sovereign identity systems. While touted as a tool for empowerment, the study warns that its European-wide adoption may inadvertently perpetuate historical identity challenges and place individuals in a vulnerable position. In June, experts from the United States underscored the role of AI in public administration with their work, Catching up with AI: Pushing toward a cohesive governance framework, emphasising the need for unified AI governance. In July, Chinese researchers introduced MDS coding enabled proxy-based Internet censorship circumvention system, revealing a groundbreaking technique for bypassing Internet restrictions through maximum distance separable coding.

    Emerging Topic:

    Anticipation Potential

    Democracy-Affirming Technologies

    Sub-Fields:

    Censorship circumvention and content moderation
    Privatisation of governance
    Digital identity and trust
    Verification technologies
    Digital technology can enhance or diminish the democratic process depending on how it is used. While the security of our online identity has high disruptive potential, it is an established area of development, lowering its anticipation score. In contrast, verification technologies and approaches to moderate online content without censoring it are around 15 years from maturity according to our experts. These areas should be the focus in the coming years.

    GESDA Best Reads and Key Resources

    Article

    MDS coding enabled proxy-based Internet censorship circumvention system

    Published:

    27th Sep 2023
    In this letter, a novel maximum distance separable coding enabled proxy-based Internet censorship circumvention system is proposed to handle severe security threats. By introducing redundancy encoding and multi-proxy transmission, its anti-censorship capability is significantly enhanced in terms of transmission reliability and data security. A generalized characterization method is constructed for the proposed system utilizing a six-parameter tuple. Defining successful transmission probability and secure transmission probability as the evaluation metrics of system performances, their mathematical formulations are further derived theoretically. Extensive simulation results are provided to demonstrate the effectiveness and advantages of the proposed system.