Workshop 1b: Protecting vulnerable groups online from harmful content – new (technical) approaches

  1. 1 Leave a comment on paragraph 1 6
  2. Type of content: Self-generated abuse material and pathological content are emerging as the most trending harms to vulnerable groups online. This is further compounded by the privacy paradox, where privacy protection protocols create unintended vulnerabilities.
  1. 2 Leave a comment on paragraph 2 12
  2. Privacy-Respectful, Inclusive, and Accessible Technical Approaches: Client-side scanning for detecting CSA online involves methods that can be privacy-respecting, even though concerns are raised about anti-grooming techniques analysing visual and textual data. AI deployment involves issues of proxies, biases, and accuracy, necessitating inclusive and accurate data for effective task-oriented models that respect privacy, especially leveraging metadata. Authorities play a crucial role in double-checking these measures’ effectiveness and privacy compliance. Looking ahead, the European ID based on private blockchain technology may be a future-proof solution for robust verification and privacy protection.
  1. 3 Leave a comment on paragraph 3 5
  2. Diversity and Multi-Stakeholder Philosophy: A diversified multi-stakeholder approach is required to ensure that solutions are comprehensive in addressing harmful online content. Significant weight should be given to civil society, including individuals from non-technical backgrounds (e.g. psychology, ethics, cybersecurity, crypto-technologists, political science, etc.).

Source: https://comment.eurodig.org/eurodig-2024-messages/workshops/workshop-1b-protecting-vulnerable-groups-online-from-harmful-content-new-technical-approaches/