Digitalization in the EU
Source: Requisite Institute
Name: Rusol Al-Kadimi (647895)
Date: 8 April 2022
Course name: EU Policy-Making: Current Issues and Strategies
Word count: 3192
Citation method: APA
Fast Track Law & Safety, Inholland
, Rusol Al-Kadimi, 8 April 2022, EU Policy-Making Exam Paper
Contents
1. Introduction..................................................................................................................................................................................... 3
Main question and sub-questions....................................................................................................................................................4
2. Digital sovereignty............................................................................................................................................................................ 4
Policies related to digital sovereignty..............................................................................................................................................4
3. Challenges in the field of privacy......................................................................................................................................................5
Cybercriminals................................................................................................................................................................................. 5
Location data................................................................................................................................................................................... 6
Digital ID........................................................................................................................................................................................... 6
Facial recognition.............................................................................................................................................................................6
4. Dangers of digitalization................................................................................................................................................................... 6
Digital social inequality....................................................................................................................................................................6
Employment impact.........................................................................................................................................................................7
Cyber-attacks................................................................................................................................................................................... 7
Social isolation among older adults..................................................................................................................................................8
5. Conclusion........................................................................................................................................................................................ 8
6. Recommendations........................................................................................................................................................................... 9
2
Source: Requisite Institute
Name: Rusol Al-Kadimi (647895)
Date: 8 April 2022
Course name: EU Policy-Making: Current Issues and Strategies
Word count: 3192
Citation method: APA
Fast Track Law & Safety, Inholland
, Rusol Al-Kadimi, 8 April 2022, EU Policy-Making Exam Paper
Contents
1. Introduction..................................................................................................................................................................................... 3
Main question and sub-questions....................................................................................................................................................4
2. Digital sovereignty............................................................................................................................................................................ 4
Policies related to digital sovereignty..............................................................................................................................................4
3. Challenges in the field of privacy......................................................................................................................................................5
Cybercriminals................................................................................................................................................................................. 5
Location data................................................................................................................................................................................... 6
Digital ID........................................................................................................................................................................................... 6
Facial recognition.............................................................................................................................................................................6
4. Dangers of digitalization................................................................................................................................................................... 6
Digital social inequality....................................................................................................................................................................6
Employment impact.........................................................................................................................................................................7
Cyber-attacks................................................................................................................................................................................... 7
Social isolation among older adults..................................................................................................................................................8
5. Conclusion........................................................................................................................................................................................ 8
6. Recommendations........................................................................................................................................................................... 9
2