The Guidelines Ethical by Design and Ethics of Use Approaches for Artificial Intelligence have provided an extensive and detailed set of indications grounded on interdisciplinary debate regarding the use of artificial intelligence. This article aims to leverage the intellectual work leading to its ethical approaches to develop a framework adapted to the specificities of cybersecurity. The overall result of this paper is to propose Ethical and Legal by Design and Assessment Guidelines (ELDA) that integrate the ethics questions and the legal questions, arguing that an ethical by design approach cannot be sustained without its big brother: legal by design. Ethics by design can be a policy direction until there is a clearly emerging legal framework. Legal by design in technological domains is often taken for granted, better “assumed as granted” by the need to be lawful. Building on these premises, this text aims to provide initial advice on both perspectives when designing, developing, deploying, or using cybersecurity solutions, regardless of the sector of application.

Proposing ELDA methodology: Ethical and Legal by Design and Assessment for cybersecurity solutions

comande, giovanni
2025-01-01

Abstract

The Guidelines Ethical by Design and Ethics of Use Approaches for Artificial Intelligence have provided an extensive and detailed set of indications grounded on interdisciplinary debate regarding the use of artificial intelligence. This article aims to leverage the intellectual work leading to its ethical approaches to develop a framework adapted to the specificities of cybersecurity. The overall result of this paper is to propose Ethical and Legal by Design and Assessment Guidelines (ELDA) that integrate the ethics questions and the legal questions, arguing that an ethical by design approach cannot be sustained without its big brother: legal by design. Ethics by design can be a policy direction until there is a clearly emerging legal framework. Legal by design in technological domains is often taken for granted, better “assumed as granted” by the need to be lawful. Building on these premises, this text aims to provide initial advice on both perspectives when designing, developing, deploying, or using cybersecurity solutions, regardless of the sector of application.
2025
File in questo prodotto:
File Dimensione Formato  
1-s2.0-S2212473X25000926-main.pdf

solo utenti autorizzati

Tipologia: PDF Editoriale
Licenza: Copyright dell'editore
Dimensione 757.46 kB
Formato Adobe PDF
757.46 kB Adobe PDF   Visualizza/Apri   Richiedi una copia

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11382/582432
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
social impact