PL EN
REVIEW PAPER
THE APPLICABILITY OF THE GDPR TO ARTIFICIAL INTELLIGENCE AND THE RESULTING THREATS TO NATIONAL INFORMATION SECURITY
 
 
More details
Hide details
1
Akademia Leona Koźmińskiego w Warszawie
 
 
A - Research concept and design; B - Collection and/or assembly of data; C - Data analysis and interpretation; D - Writing the article; E - Critical revision of the article; F - Final approval of article
 
 
Submission date: 2022-05-01
 
 
Final revision date: 2022-06-17
 
 
Acceptance date: 2022-06-20
 
 
Publication date: 2022-06-20
 
 
Corresponding author
Tomasz Tadeusz GUTA   

Akademia Leona Koźmińskiego w Warszawie
 
 
SBN 2022;24(2): 25-46
 
KEYWORDS
TOPICS
ABSTRACT
Both national security and information security are closely associated with and connected to the emerging field of artificial intelligence. In this regard, following the presumed axioms of the anticipated proliferation of AI systems within modern society and its expected widespread implementation in vital public and private institutions and furthermore the extensive application of AI systems within personal data processing, possible threats to national and information security within the European Union - with an emphasis on Poland and the Polish legal system – are explored. On the basis of an overview of the theoretical basis of the concepts of national and information security and artificial intelligence, the emergence of AI within personal data processing in the context of the GDPR legal framework is discussed. At least one potential conflict between the implications of the hypothetical scenario of the emergence of the so-called strong form of artificial intelligence and both the Polish data privacy legal framework (based, inter alia, on the GDPR) and the Polish information security is being identified in this context. The academic article draws the conclusion that the emergence of so-called “strong AI” may lead to a number of real and probable threats to the system of personal data protection and information security in Poland (and possibly in other EU Member States as well). The paper finally concludes by outlining and discussing the negative impact of the identified conflict, in particular on Polish information security, and calls for efforts to address these issues in future studies in the academic literature.
 
REFERENCES (36)
1.
Art.-29- Gruppe, 2010, Stellungnahme 1/2010 zu den Begriffen „für die Verarbeitung Verantwortlicher“ und „Auftragsverarbeiter“, Working Paper 169.
 
2.
Boucher, P., 2020, Artificial intelligence: how does it work, why does it matter, and what we can do about it?, European Parliament, Directorate-General for Parliamentary Research Services, European Parliament.
 
3.
EU Parliament, 2017, Civil law rules on robotics, European Parliament, http://www.europarl. europa.eu/doceo/document/A-8-2017-0005_ENG.html (Date of access: 2.1.2022).
 
4.
Depo, J., Mazur, S., 2015, Administracja bezpieczeństwa, informacji niejawnych i danych osobowych, Kraków, Vademecum, Krakowska Akademia im. Andrzeja Frycza Modrzewskiego, Wydział Nauk o Bezpieczeństwie.
 
5.
Directorate D (Fundamental Rights and Citizenship) of the European Commission, Directorate- -General Justice, 2010, Opinion 1/2010 on the concepts of „controller” and „processor, Brussels, Freedom and Security.
 
6.
Haliżak, E., Popiuk-Rysińska, J., 1995, Państwo we współczesnych stosunkach międzynarodowych, Warszawa, Wydawnictwo “Scholar”.
 
7.
Hartmann, C., Allan, J., Hugenholtz, P., et al., 2020, Trends and developments in artificial intelligence: challenges to the intellectual property rights framework: final report, European Commission, Directorate-General for Communications Networks, Content and Technology, Brussels, https://data.europa.eu/doi/10.... [Accessed 12 February 2022].
 
8.
High-Level Expert Group on Artificial Intelligence, Ethics Guidelines for Trustworthy AI, 2019, Brussels, European Commission.
 
9.
Humerick, M., 2018, Taking AI Personally: How the E.U. Must Learn to Balance the Interests of Personal Data Privacy & Artificial Intelligence, Santa Clara, Santa Clara High Tech. L.J. (393).
 
10.
Jakubczak, R., 2008, Podstawy bezpieczeństwa narodowego Polski w erze globalizacji, Warszawa, Wydawnictwo Akademii Obrony Narodowej.
 
11.
Jakubczak, R., 2004, Obrona narodowa w tworzeniu bezpieczeństwa III RP, Warszawa, Dom Wydawniczy Ballona.
 
12.
Jebari, K. and Lundborg, J., 2021, Artificial superintelligence and its limits: why AlphaZero cannot become a general agent, AI & SOCIETY, Vol. 3/2021.
 
13.
Kesa A. and Kerikmäe T., 2020, Artificial Intelligence and the GDPR: Inevitable Nemeses?, TalTech Journal of European Studies, Vol.10 (Issue 3).
 
14.
Kurek, J., 2021, Bezpieczeństwo Państwa w warunkach hybrydowej regulacji danych osobowych w dobie analizy Big data. Aspekty prawne, organizacyjne i systemowe, War Studies University.
 
15.
Kitler, W., 2011, Bezpieczeństwo narodowe RP. Podstawowe kategorie, uwarunkowania, system, Warszawa, Akademia Obrony Narodowej.
 
16.
Kitler, W., 2019, System bezpieczeństwa narodowego RP – aspekty prawno-organizacyjne, Warszawa, Wiedza Obronna, t. 268 nr 3.
 
17.
Kowalkowski, S., 2011, Niemilitarne zagrożenia bezpieczeństwa publicznego, Warszawa AON.
 
18.
Kurzweil, R., 1990, The age of intelligent machines. Cambridge, Mass, MIT Press.
 
19.
Liderman, K., 2012, Bezpieczeństwo informacyjne, Warszawa, Wydawnictwo Naukowe PWN.
 
20.
Liderman, K., Malik, A., 2013, Polityka informacyjna a bezpieczeństwo informacyjne, Warszawa.
 
21.
Linde, H., Schweizer, I., 2019, A White Paper on the Future of Artificial Intelligence, Boston, MIT Press.
 
22.
Marczak J., 2008, Bezpieczeństwo narodowe – pojęcie, charakter, uwarunkowania, Warszawa, [in:] R. Jakubczak, J. Marczak, K. Gąsiorek, W. Jakubczak, Podstawy bezpieczeństwa narodowego Polski w erze globalizacji.
 
23.
McCarthy, J., 2003, What is artificial intelligence?, At http://jmc.stanford.edu/artifi... what-is-ai/index.html, [accessed 04 January 2022].
 
24.
Nowak, E., Nowak, M., 2011, Zarys teorii bezpieczeństwa narodowego, Warszawa, Difin SA.
 
25.
OECD Digital Economy Outlook, 2017, Paris, OECD Publishing.
 
26.
Pennachin, C., Goertzel, B., 2007, Contemporary Approaches to Artificial General Intelligence, In: Goertzel, B., Pennachin, C. (eds) Artificial General Intelligence. Cognitive Technologies, Berlin/Heidelberg, Springer Verlag.
 
27.
Perez, J. A., Deligianni, F., Ravi, D., Yang, G., 2017, Artificial Intelligence and Robotics, London, EPSRC UK-RAS Network.
 
28.
Polończyk, A., 2013, Zagrożenia bezpieczeństwa informacyjnego na przykładzie Krajowej Mapy Zagrożeń Bezpieczeństwa, Kraków, Uniwersytet Pedagogiczny im. Komisji Edukacji Narodowej, Instytut Bezpieczeństwa i Edukacji Obywatelskiej.
 
29.
Puraite, A., Silinske, N., 2017, Understanding the concept of security: theoretical approach, Public Security and Public Order, Vol. 19, pp. 135-145.
 
30.
Szempruch, J., 2012, Nauczyciel w warunkach zmiany społecznej i edukacyjnej, Kraków, Oficyna Wydawnicza Impuls.
 
31.
Stańczyk, J., 1996, Współczesne pojmowanie bezpieczeństwa, Warszawa, Instytut Studiów Politycznych Polskiej Akademii Nauk.
 
32.
Tarnoff, P. Kreisler, H., 1999, Making Foreign Policy in a Democracy: Conversations with Peter Tarnoff, In Conversations with History Series, Berkeley (CA), Institute of International Studies, http://globetrotter.berkeley.e...., [Accessed: 22.02.2022].
 
33.
Trager F.N., Simone F.N., National Security and American Society, 1973, Wrocław [in:] Leksykon politologii, cited after: R. Jakubczak (red.), 2004, Obrona narodowa w tworzeniu bezpieczeństwa III RP, Warszawa.
 
34.
Więcaszek-Kuczyńska, L., 2014, Zagrożenia bezpieczeństwa informacyjnego, Warszawa, Obronność – Zeszyty Naukowe Wydziału Zarządzania i Dowodzenia Akademii Sztuki Wojennej.
 
35.
Wladawksy-Berger, I., Soft’ Artificial Intelligence Is Suddenly Everywhere, January 16, 2016, The Wall Street Journal, http://blogs.wsj.com/ cio/2015/01/16/soft-artificial-intelligence-is-suddenlyeverywhere/, [Accessed: 18.02.2022].
 
36.
Wrzosek, M., 2010, Procesy informacyjne w zarządzaniu organizacją zhierarchizowaną, Warszawa, AON.
 
ISSN:2082-2677
Journals System - logo
Scroll to top