Open access
Five AI management strategies—and how they could shape the future
Atlantic Council GeoTech Center AI Connect II
2025
Co-authors: Wendy Hall
Themes: Artificial Intelligence (AI)
Category: Blog, Open access
The AI governance regime is evolving, and fortunately it is focused on predictable or evident risks, not speculative existential threats. Governments can legislate, and some have. New institutions, such as the EU’s AI Office and Britain’s AI Safety Institute, have emerged. Supranational groupings foster cooperation and standards, such as the United Nations AI Advisory Body, or the Group of Seven’s Hiroshima Process, and alongside these has been a tsunami of summitry and experience sharing. The combination of government regulation, global policy frameworks, research and testing infrastructure, and best practices will gradually coalesce into a recognizable AI governance regime with established norms and shared principles. In this shuffle, we see the repurposing of the ideal types of governance of the O’Hara/Hall Four Internets framework as governance strategies in the AI context, which we term Artificial Intelligence Management Strategies, or AIMS.
Read the articleFive AIMS: Lessons from Internet Governance for Artificial Intelligence Management Strategies
Sciences Po Tech & Global Affairs Innovation Hub
2025
Co-authors: Wendy Hall, Pierre Noro
Themes: Artificial Intelligence (AI)
Category: Open access, White paper/report
To help scaffold coherent, coordinated, and enforceable rules and institutions, Dame Wendy Hall, Kieron O’Hara, and Pierre Noro reinterpret the Four Internet models elaborated by Hall and O’Hara in their influential book Four Internets: Data, Geopolitics, and the Governance of Cyberspace in regard to AI technologies. This translation, grounded in an analysis of the historical, socio-economic, and ideological differences distinguishing the context that shaped Internet governance and the current one, yields many enlightening insights and is the foundation of five Artificial Intelligence Management Strategies (AIMS). With many illustrations to exemplify their core tenets, their limits and their intersections, this paper offers the Five AIMS as cardinal concepts to help AI governance stakeholders, especially public and private decisionmakers, navigate the upcoming AI Action Summit and future governance conversation. Concluding on a set of ongoing research questions reflecting open policy challenges, it is a foundational step towards cementing the Five AIMS as a suitable framework for understanding the governance of AI.
Read the article Download the articleAI in the UK: A Short History
Wendy Hall & Jérôme Pesenti, Growing the Artificial Intelligence Industry in the UK, 18-20
2017
Themes: Artificial Intelligence (AI)
Category: Book chapter, Open access
A brief narrative of the major events in British AI research from Alan Turing to DeepMind.
Read the article Download the articleA general definition of trust
Technical report
2012
Themes: Trust
Category: Open access, White paper/report
In this paper a definition and conceptual analysis of trust is given in terms of trustworthiness. Its focus will be as wide as possible, and will not be restricted to any particular type of trust. The aim is to show the key parameters that enable us to investigate and understand trust, thereby facilitating the development of systems, institutions and technologies to support, model or mimic trust. The paper will also show the strong connection between trust and trustworthiness, showing how the subjectivity of trust reveals itself in attitudes toward others’ trustworthiness; to trust someone/something is to believe that he/she/it is trustworthy. Both trust and trustworthiness are context-dependent, but the relevant contexts are different depending on whether one is trusting or trustworthy. Finally, the paper will discuss some of the complex issues connected with the alignment of trust with trustworthiness.
Read the article Download the articleOn blockchains and the General Data Protection Regulation
EU Blockchain Observatory and Forum
2018
Co-authors: Luis-Daniel Ibáñez, Elena Simperl
Themes: Blockchain/cryptocurrency, Data protection
Category: Open access, Peer reviewed, White paper/report
In this paper, we review the legal and technological state of play of the GDPR-Blockchain relationship. Next, we analyse three interaction scenarios between data subjects and blockchain systems, and propose possible ways of achieving GDPR compliance by using state of the art technologies. Finally we review current efforts in the use of blockchains to enforce GDPR principles, in particular ‘Data Protection by Design’.
Read the article Download the articleYou are being watched: review of Macnish, The Ethics of Surveillance
Metascience, 27(2), 271-274
2018
Themes: Privacy
Category: Book review, Open access
Review of Kevin Macnish’s book The Ethics of Surveillance.
Read the article Download the articlePity the poor engineer: review of Ragnedda & Muschert, Theorizing Digital Divides, and Ekbia & Nardi, Heteromation
European Journal of Communication, 33(3), 338-343
2018
Themes: Computing/The Internet, Digital modernity
Category: Book review, Open access
Review of two books, different in tone and intended audience, pour cold water on the optimism of the engineering project of using digital technologies to enable networks to develop and flourish at scale. Theorizing Digital Divides punctures the positive narrative of inclusion, while Heteromation problematises the whole idea.
Read the article Download the articleThe digitally extended self: a lexicological analysis of personal data
Journal of Information Science, 44(4), 552-565
2017
Co-authors: Brian Parkinson, David E. Millard, Richard Giordano
Themes: Privacy
Category: Journal article, Open access, Peer reviewed
Individuals’ privacy, especially with regard to their personal data, is increasingly an area of concern as people interact with a wider and more pervasive set of digital services. Unfortunately, the terminology around personal data is used inconsistently, the concepts are unclear and there is a poor understanding of their relationships. This is a challenge to those who need to discuss personal data in precise terms, for example, legislators, academics and service providers who seek informed consent from their users. In this article, we present a lexicological analysis of the terms used to describe personal data, use this analysis to identify common concepts and propose a model of the digitally extended self that shows how these concepts of personal data fit together. We then validate the model against key publications and show in practice how it can be used to describe personal data in three scenarios. Our work shows that there is no clearly delineated kernel of personal data, but rather that there are layers of personal data, with different qualities, sources and claims of ownership, which extend out from the individual and form the digitally extended self.
Read the article Download the articleMargaret Thatcher (1925-2013)
Mark Garnett (ed.), Conservative Moments: Reading Conservative Texts, London: Bloomsbury, 127-136
2018
Themes: Conservatism, Conservative Party
Category: Book chapter, Open access, Peer reviewed
This chapter explores three questions. First, what is the nature of Thatcher’s political philosophy, and in particular the uncompromising statement that ‘there is no such thing as society’? Second, can we judge whether her policies in office were consistent with a tenable understanding of conservatism? Third, can we trace some of the antecedents of her thinking, and place her, tentatively at least, within a tradition?
Read the article Download the articleAvoiding omnidoxasticity in logics of belief: a reply to MacPherson
Notre Dame Journal of Formal Logic, 36(3), 475-495
1995
Co-authors: Han Reichgelt, Nigel Shadbolt
Themes: Artificial Intelligence (AI)
Category: Journal article, Open access, Peer reviewed
In recent work MacPherson argues that the standard method of modeling belief logically, as a necessity operator in a modal logic, is doomed to fail. The problem with normal modal logics as logics of belief is that they treat believers as “ideal” in unrealistic ways (i.e., as omnidoxastic); however, similar problems re-emerge for candidate non-normal logics. The authors argue that logics used to model belief in artificial intelligence (AI) are also flawed in this way. But for AI systems, omnidoxasticity is impossible because of their finite nature, and this fact can be exploited to produce operational models of fallible belief. The relevance of this point to various philosophical views about belief is discussed.
Read the article Download the articleWhy should I? Cybersecurity, the security of the state and the insecurity of the citizen
Politics and Governance, 6(2), 41-48
2018
Co-authors: Lizzie Coles-Kemp, Debi Ashenden
Themes: Cybersecurity, Society
Category: Journal article, Open access, Peer reviewed
Assumptions are made by government and technology providers about the power relationships that shape the use of technological security controls and the norms under which technology usage occurs. We present a case study carried out in the North East of England that examined how a community might work together using a digital information sharing platform to respond to the pressures of welfare policy change. We describe an inductive consideration of this highly local case study before reviewing it in the light of broader security theory. By taking this approach we problematise the tendency of the state to focus on the security of technology at the expense of the security of the citizen. From insights gained from the case study and the subsequent literature review, we conclude that there are three main absences not addressed by the current designs of cybersecurity architectures. These are absences of: consensus as to whose security is being addressed, evidence of equivalence between the mechanisms that control behaviour, and two-way legibility. We argue that by addressing these absences the foundations of trust and collaboration can be built which are necessary for effective cybersecurity. Our consideration of the case study within the context of sovereignty indicates that the design of the cybersecurity architecture and its concomitant service design has a significant bearing on the social contract between citizen and state. By taking this novel perspective new directions emerge for the understanding of the effectiveness of cybersecurity technologies.
Read the article Download the articleSmart contracts – dumb idea
IEEE Internet Computing, 21(2), 97-101
2017
Themes: Blockchain/cryptocurrency
Category: Journal article, Open access, The Digital Citizen
Increasingly in e-commerce, smart contracts have relied on the code as the contract. But code can be hacked and fail, leaving multiple parties potentially exposed to legal gray areas, great financial loss, and little recourse. Here, Kieron O’Hara considers the ramifications of such contracts by exploring what happened when the Ethereum platform was hacked in the summer of 2016.
Read the article Download the articleThe seven veils of privacy
IEEE Internet Computing, 20(2), 86-91
2016
Themes: Privacy
Category: Journal article, Open access, The Digital Citizen
Here, Kieron O’Hara details a framework of seven levels to help separate the effects and affects of privacy from the facts. In looking at when a privacy boundary is crossed or not, this framework helps citizens think about when that’s problematic, and why this differs not only across cultures, but also across generations and even for the same individuals.
Read the article Download the articleAuthority printed upon emptiness
IEEE Internet Computing, 19(6), 72-76
2015
Themes: Blockchain/cryptocurrency
Category: Journal article, Open access, The Digital Citizen
In a time of economic volatility, what can cryptocurrencies such as bitcoin bring to the table? What new vulnerabilities would they introduce? And could they be minimized through consumer protection mechanisms?
Read the article Download the articleThe read-write Linked Data Web
Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, 371(1987), 20120513
2013
Co-authors: Tim Berners-Lee
Themes: Semantic Web/linked data
Category: Journal article, Open access
This paper discusses issues that will affect the future development of the Web, either increasing its power and utility, or alternatively suppressing its development. It argues for the importance of the continued development of the Linked Data Web, and describes the use of linked open data as an important component of that. Second, the paper defends the Web as a read–write medium, and goes on to consider how the read–write Linked Data Web could be achieved.
Read the article Download the articleThe right to be forgotten: the good, the bad and the ugly
IEEE Internet Computing, 19(4), 73-79
2015
Themes: Data protection
Category: Journal article, Open access, The Digital Citizen
Viviane Reding’s (three-time European Commissioner) muscular speeches advocating a right to be forgotten for Europeans kick-started a ruckus that has pitched the European Union (EU) against the US and privacy activists against Big Data advocates. This issue gained momentum in May 2014, when an appeal by Google Spain against a decision of the Spanish Data Protection Authority (DPA), la Agencia Española de Protección de Datos (AEPD), was rejected by the Court of Justice of the European Union (CJEU), thereby enshrining the right to be forgotten in law. This paper discusses in depth considers the right to be forgotten, including its potential ramifications and successes.
Read the article Download the articleData trusts
European Data Protection Law Review, 6(4), 484-491
2020
Themes: Data trusts, Privacy
Category: Journal article, Open access
Recent years have seen the burgeoning of a literature on data trusts, and the unwary might therefore be led to believe that it is an idea whose time has come. Unfortunately, the ideas of the various authors who have contributed to this literature, who include the present author, haven’t always coincided, and have been aimed at different problems at different levels of detail and hand-waving. We might therefore say more accurately that ‘data trust’ is a brand whose time has come, which in itself is a not uninteresting phenomenon, worthy of consideration.
Read the article Download the articleData, legibility, creativity … and power
IEEE Internet Computing, 19(2), 88-91
2015
Themes: Digital modernity
Category: Journal article, Open access, The Digital Citizen
In a world where data crunching has the potential to crunch out the individual, how can people respond? Kieron O’Hara discusses the dangers and downfalls of conflating people with data, without a balance in feedback between algorithms and individuals.
Read the article Download the articleThe fridge’s brain sure ain’t the icebox
IEEE Internet Computing, 18(6), 81-84
2014
Themes: Computing/The Internet, Privacy
Category: Journal article, Open access, The Digital Citizen
The emergence of the Internet of Things (IoT) promises new and exciting possibilities for our personal health, transport, the environment, and many other areas. However, it does of course pose privacy and security problems. This article argues that there are six complex and difficult privacy concerns that are specific to the IoT. The situation is made even more complex because it isn’t clear who should regulate the IoT, and how best to do it.
Read the article Download the articleMemories for life: a review of the science and technology
Journal of the Royal Society Interface, 3(8), 351-365
2006
Co-authors: Richard Morris, Nigel Shadbolt, Graham J. Hitch, Wendy Hall, Neil Beagrie
Themes: Memory
Category: Journal article, Open access, Peer reviewed
This paper discusses scientific, social and technological aspects of memory. Recent developments in our understanding of memory processes and mechanisms, and their digital implementation, have placed the encoding, storage, management and retrieval of information at the forefront of several fields of research. At the same time, the divisions between the biological, physical and the digital worlds seem to be dissolving. Hence, opportunities for interdisciplinary research into memory are being created, between the life sciences, social sciences and physical sciences. Such research may benefit from immediate application into information management technology as a testbed. The paper describes one initiative, memories for life, as a potential common problem space for the various interested disciplines.
Read the article Download the articleIn worship of an echo
IEEE Internet Computing, 18(4), 79-83
2014
Themes: Extremism
Category: Journal article, Open access, The Digital Citizen
This column critically examines the hypothesis that the Internet is responsible for creating echo chambers, in which groups can seal themselves off from heterodox opinion, via filtering and recommendation technology. Echo chambers are held responsible by many for political polarization, and the growth of extremism, yet the evidence doesn’t seem to support this view. Echo chambers certainly exist, and can be detrimental to deliberation and discussion, but equally have a role to play in group formation, solidarity, and identity. The case for intervening in Internet governance to suppress echo chambers is not proven.
Read the article Download the articleReview of Honderich, Conservatism
Contemporary Political Theory, 5(3), 354-358
2006
Themes: Conservatism
Category: Book review, Open access
Review of Ted Honderich, Conservatism: Burke, Nozick, Bush, Blair?
Read the article Download the articleThe information spring
IEEE Internet Computing, 18(2), 79-83
2014
Themes: Transparency/open data
Category: Journal article, Open access, The Digital Citizen
The great sociologist Max Weber conceived government as a sort of giant information processor. Yet despite great strides and many successes in e-government and the application of IT to government, semantically enabled public administration has still not established itself. This column argues that there is still room for optimism, because open data and semantic technologies could revolutionize not just governments’ information processing practices, but the purpose and scope of government itself. We have to come to terms with not only the machinery of administration, but also the wider question of the relationship between citizens and Leviathan. This is obviously not merely a technical question. Liberation is a theme in modern politics, from the Prague Spring to the Arab Spring. We are seeing the emergence of an Information Spring, which could set data and information free to serve the people — if we understand its implications in the right way.
Read the article Download the articleThe many-headed e-monster
IEEE Internet Computing, 17(6), 88-92
2013
Themes: Politics
Category: Journal article, Open access, The Digital Citizen
Across the world, politics has been transformed by e-populism, where parties support freedom of the Internet, direct democracy, transparency and free speech. E-populists have proved powerful opponents, upsetting governments in Italy, Egypt and elsewhere. But can e-populism succeed in creating inclusive, constructive government? Does the power of the Internet need to be mitigated by alternative institutions?
Read the articleIntroduction: Life and the law in the era of data-driven agency
Mireille Hildebrandt & Kieron O'Hara (eds.), Life and the Law in the Era of Data-Driven Agency, 1-15
2020
Co-authors: Mireille Hildebrandt
Category: Book chapter, Open access
This chapter introduces the core topics of the volume Life and the Law in the Era of Data-Driven Agency, providing a hopefully appetizing overview of the chapters and their interrelations.
Read the article Download the articlePreface
Mireille Hildebrandt & Kieron O'Hara (eds.), Life and the Law in the Era of Data-Driven Agency, xii-xiv
2020
Co-authors: Mireille Hildebrandt
Category: Book chapter, Open access
Preface to the volume Life and the Law in the Era of Data-Driven Agency, edited by Mireille Hildebrandt and Kieron O’Hara.
Read the article Download the articleBetween the editors
Mireille Hildebrandt & Kieron O'Hara (eds.), Life and the Law in the Era of Data-Driven Agency, 16-43
2020
Co-authors: Mireille Hildebrandt,
Category: Book chapter, Open access
This chapter contains a crossing of swords and thoughts between the editors, who come from different disciplinary backgrounds and different philosophical traditions, but nevertheless occupy much common ground. The conversation is too short to enable the cutting edge of Occam’s razor, but refers to other work with more extensive argumentation. We agree on a great deal. In particular, we share a precautionary approach that requires proactive consideration of how one’s experimental business models or progressive politics may impact others. However, as the reader will see, at that point we part company! The ensuing dialogue has been illuminating for us, and hopefully will whet the reader’s appetite for the excellent chapters that follow in our edited book Life and the Law in the Era of Data-Driven Agency.
Read the article Download the articleAre we getting privacy the wrong way round?
IEEE Internet Computing, 17(4), 89-92
2013
Themes: Privacy
Category: Journal article, Open access, The Digital Citizen
Individualists, communitarians, and technological determinists agree that privacy’s benefits accrue to individuals, and that its costs (in terms of less security or efficiency) fall on society. As such, it is the individual’s choice to give privacy away. However, privacy does benefit wider society in important respects, and so this consensus is flawed.
Read the article Download the articleLifelogging: privacy and empowerment with memories for life
Identity in the Information Society, 1(2), 155-172
2009
Co-authors: Mischa M. Tuffield, Nigel Shadbolt
Themes: Memory
Category: Journal article, Open access, Peer reviewed
The growth of information acquisition, storage and retrieval capacity has led to the development of the practice of lifelogging, the undiscriminating collection of information concerning one’s life and behaviour. There are potential problems in this practice, but equally it could be empowering for the individual, and provide a new locus for the construction of an online identity. In this paper we look at the technological possibilities and constraints for lifelogging tools, and set out some of the most important privacy, identity and empowerment-related issues. We argue that some of the privacy concerns are overblown, and that much research and commentary on lifelogging has made the unrealistic assumption that the information gathered is for private use, whereas, in a more socially-networked online world, much of it will have public functions and will be voluntarily released into the public domain.
Read the article Download the articleThe contradictions of digital modernity
AI & Society, 35(1), 197-208
2018
Themes: Computing/The Internet, Digital modernity
Category: Journal article, Open access, Peer reviewed
This paper explores the concept of digital modernity, the extension of narratives of modernity with the special affordances of digital networked technology. Digital modernity produces a new narrative which can be taken in many ways: to be descriptive of reality; a teleological account of an inexorable process; or a normative account of an ideal sociotechnical state. However, it is understood that narratives of digital modernity help shape reality via commercial and political decision-makers, and examples are given from the politics and society of the United Kingdom. The paper argues that digital modernity has two dimensions, of progression through time and progression through space, and these two dimensions can be in contradiction. Contradictions can also be found between ideas of digital modernity and modernity itself, and also between digital modernity and some of the basic pre-modern concepts that underlie the whole technology industry. Therefore, digital modernity may not be a sustainable goal for technology development.
Read the article Download the articlePersonalisation and digital modernity: deconstructing the myths of the subjunctive world
Utal Kohl & Jacob Eisler (eds.), Data-Driven Personalisation in Markets, Politics and Law, 37-54
2021
Themes: Computing/The Internet, Digital modernity
Category: Book chapter, Open access, Peer reviewed
In this chapter, I discuss the role of personalisation in a wider narrative of the development of democratic societies, in terms of digital modernity, driven by a vision of data-driven innovation over networked structures facilitating socio-environmental control. This chapter deals with narratives of how modernity plays out and is implemented by institutions and technologies, which are inevitably partial, and selective in what they foreground and ignore. It begins with a discussion of digital modernity, showing how data-driven personalisation is central to it, and how privacy not only loses its traditional role as a support for individuality, but becomes a blocker for the technologies that will realise the digitally modern vision. The chapter develops the concept of the subjunctive world, in which individuals’ choices are replaced by what they would have chosen if only they had sufficient data and insight. Furthermore, the notions of what is harmful for the individual, and the remedies that can be applied to these, become detached from the individual’s lived experience, and reconnected, in the policy space, to the behaviour and evolution of models of the individual and his or her environment.
Read the article Download the articleWelcome to (and from) the Digital Citizen
IEEE Internet Computing, 17(1), 92-95
2013
Themes: Computing/The Internet, Politics
Category: Journal article, Open access, The Digital Citizen
In this introductory Digital Citizen column, Kieron O’Hara explores some issues regarding the definition of “digital citizenship,” focusing on the associated rights and responsibilities, the value to be gained from citizenship, and the problems caused by conflict.
Read the articleBurkean conservatism, legibility and populism
Journal of Political Ideologies, 26(1), 81-100
2020
Themes: Conservatism, Politics
Category: Journal article, Open access, Peer reviewed
Links have sometimes been drawn between conservatism and populism, but the radical nature of the latter, focused on change as a direct end, means that they cannot be connected so easily. This article argues that nevertheless, conservative thinking of the Burkean tradition can be used to understand, and possibly address, populist concerns. This is not because conservatism is biased towards the status quo – the conservative argues, on the contrary, that innovators, whether rationalist or populist, undervalue the status quo, and are therefore biased against it. Rather, the conservative values the legibility of a person’s society or culture to that person, and diagnoses many populist grievances as resulting from innovation making society less legible to the individuals within it.
Read the article Download the article