Articles
Vol. 54 No. 1 (2025): Law and Social Bonds nr 1 (54) 2025
Artificial Intelligence in e-Administration
Cooperative Research Institute in Sopot
University of Warmia and Mazury
Engineering and Innovation Department French Prime Minister Services
Abstract
Nowadays, the influence exerted by artificial intelligence on many spheres of human life has been steadily on the rise. It is a tool that e-Administration can – or should – use in its activities. However, caution must be exercised when using artificial intelligence systems, as their inappropriate use can lead to several threats, including data leakage or infection of the ICT systems through which the public administration provides its services to society or other entities (including entrepreneurs). Artificial intelligence is both a challenge and a necessity for public administration. With the development of new technologies, it must use modern tools to meet society’s constantly evolving needs. Digitisation is now a widespread phenomenon, so meeting the needs of an information society forces public administration to look for new solutions, of which artificial intelligence is certainly one of these. The dogmatic-legal and theoretical-legal methods were employed to address the issues dealt with in the paper, which aims to analyse the need for e-Administration to use artificial intelligence. These methods have made it possible to review and analyse the applicable regulations and doctrinal views on the use of artificial intelligence systems by the public administration in the course of performing certain activities in cyberspace.
Artificial intelligence is both a challenge and a necessity for public administration. With the development of new technologies, it must use modern tools to meet society’s constantly evolving needs. Digitisation is now a widespread phenomenon, so meeting the needs of an information society forces public administration to search for new solutions, artificial intelligence certainly being one of these.
The dogmatic-legal and theoretical-legal methods were employed to address the issues dealt with in the article, which aims to analyse the need for e-Administration to use artificial intelligence. The methods in question made it possible to review and analyse the applicable regulations and doctrinal views on the use of artificial intelligence systems by public administration in the course of performing certain activities in cyberspace.
References
- Abdulkareem Abdulrazaq Kayode, Kazeem Adebayo Oladimeji, “Cultivating the digital citizen: trust, digital literacy and e-government adoption” Transforming Government: People, Process and Policy, No. 2 (2024): 270-286. https://doi.org/10.1108/TG-11-2023-0196.
Show in Google Scholar -->>
- Admass Wasyihun Sema, Yirga Yayeh Munaye, Abebe Abeshu Diro, “Cyber security: State of the art, challenges and future directions” Cyber Security and Applications, No. 2 (2024): 100031. https://doi.org/10.1016/j.csa.2023.100031.
Show in Google Scholar -->>
- Al-Mushayt Omar Saeed, “Automating E-Government Services With Artificial Intelligence” IEEE Access, Vol. VII (2019): 146821-146829. doi: 10.1109/ACCESS.2019.2946204.
Show in Google Scholar -->>
- Baker Ryan, Aaron Hawn, “Algorithmic Bias in Education” International Journal of Artificial Intelligence in Education, 32 (2022): 1052-1092. https://doi.org/10.1007/s40593-021-00285-9.
Show in Google Scholar -->>
- Bierecki Dominik, “Zasada proporcjonalności w stosowaniu rozporządzenia w sprawie operacyjnej odporności cyfrowej sektora finansowego (Digital Operations Resilience Act)” Europejski Przegląd Prawa i Stosunków Międzynarodowych, No. 3 (2024): 5-13. https://doi.org/10.52097/eppism.9272.
Show in Google Scholar -->>
- Blandin Adam, Alexander Bick, David Deming, The Rapid Adoption of Generative AI, 18 September 2024. https://ssrn.com/abstract=4965142; http://dx.doi.org/10.2139/ssrn.4965142.
Show in Google Scholar -->>
- Blauth Taís Fernanda, Oskar Josef Gstrein, Andrej Zwitter, “Artificial Intelligence Crime: An Overview of Malicious Use and Abuse of AI” IEEE Access, Vol. 10 (2022): 77110-77122. doi: 10.1109/ACCESS.2022.3191790.
Show in Google Scholar -->>
- Busuioc Madalina, “Accountable Artificial Intelligence: Holding Algorithms to Account” Public Administration Review, 81 (2021): 825-836. https://doi.org/10.1111/puar.13293.
Show in Google Scholar -->>
- Ciesielski Maciej, “Disinformation in Cyberspace. Introduction to Discussion on Criminalisation Possibilities” Cybersecurity and Law, No. 1 (2024): 185-199.
Show in Google Scholar -->>
- Cowgill Bo, Catherine Tucker, “Economics, fairness and algorithmic bias” Journal of Economic Perspectives, (2019).
Show in Google Scholar -->>
- Czuryk Małgorzata, “Cybersecurity and Protection of Critical Infrastructure” Studia Iuridica Lublinensia, No. 5 (2023): 43-52.
Show in Google Scholar -->>
- Czuryk Małgorzata, “Dopuszczalne różnicowanie sytuacji pracowników ze względu na religię, wyznanie lub światopogląd” Studia z Prawa Wyznaniowego, No. 27 (2024): 151-163.
Show in Google Scholar -->>
- Czuryk Małgorzata, “Restrictions on the Exercising of Human and Civil Rights and Freedoms Due to Cybersecurity Issues” Studia Iuridica Lublinensia, No. 3 (2022): 31-43.
Show in Google Scholar -->>
- Dike Samuel, “The Role of Artificial Intelligence and Research in Promoting Taxpayer Base and Behaviour” The International Journal of Social Sciences and Humanities Invention, No. 11 (2020). http://dx.doi.org/10.21107/infestasi.v20i1.25002.
Show in Google Scholar -->>
- Dzikowski Piotr, „Propaganda, plotka, dezinformacja – czy to działa tylko na zewnątrz organizacji?”, [in:] Zagrożenia wewnętrzne bezpieczeństwa zasobów informacyjnych w organizacji, ed. Paweł Dziuba. 9-25.Warsaw: WAT, 2023.
Show in Google Scholar -->>
- Émeline Cirou, “Say hello to Albert! The new AI in French public services” Blog Economie Numérique, 2024. https://blog.economie-numerique.net/2024/05/06/say-hello-to-albert-the-new-ai-in-french-public-service/.
Show in Google Scholar -->>
- Gaie Christophe, “An API-intermediation system to facilitate data circulation for public services: the French case study” International Journal of Computational Systems Engineering, 4 (2011): 201. https://doi.org/10.1504/ijcsyse.2021.120292.
Show in Google Scholar -->>
- Gaie Christophe, Mirosław Karpiuk, “The Provision of e-Services by Public Administration Bodies and Their Cybersecurity”, [in:] Transforming Public Services – Combining Data and Algorithms to Fulfil Citizen’s Expectations, ed. Christophe Gaie, Mayuri Mehta. 175-188. Cham: Springer, 2024.
Show in Google Scholar -->>
- Gaie Christophe, Mirosław Karpiuk, Andrea Spaziani, “Cybersecurity in France, Poland and Italy” Studia Iuridica Lublinensia, No. 1 (2025).
Show in Google Scholar -->>
- Gaie Christophe, Mayuri Mehta, “Digital Transformation of Public Services: Introduction, Current Trends and Future Directions”, [in:] Transforming Public Services – Combining Data and Algorithms to Fulfil Citizen’s Expectations, ed. Christophe Gaie, Mayuri Mehta. 175-188. Cham: Springer, 2024. https://doi.org/10.1007/978-3-031-55575-6_1.
Show in Google Scholar -->>
- Gergelewicz Tomasz, “Bipolarity of Artificial Intelligence – Chances and Threats” Ius et Securitas, No. 2 (2024).
Show in Google Scholar -->>
- Gergelewicz Tomasz, Informacja sygnalna. Katalog obszarów działań antydezinformacyjnych (Warsaw: ASzWoj, 2023).
Show in Google Scholar -->>
- Hoffmann Christian Hugo, “Is AI intelligent? An assessment of artificial intelligence, 70 years after Turing” Technology in Society, Vol. LXVIII (2022): 101893, https://doi.org/10.1016/j.techsoc.2022.101893
Show in Google Scholar -->>
- Hossain Sk Tahsin, Tan Yigitcanlar, Kien Nguyen, Yue Xu, „Cybersecurity in local governments: A systematic review and framework of key challenges” Urban Governance, No. 1 (2025).
Show in Google Scholar -->>
- Kaczmarek Krzysztof, „Dezinformacja jako czynnik ryzyka w sytuacjach kryzysowych” Rocznik Nauk Społecznych, No. 2 (2023): 19-30.
Show in Google Scholar -->>
- Kaczmarek Krzysztof, „Sztuczna inteligencja”, [in:] Leksykon cyberbezpieczeństwa, ed. Katarzyna Chałubińska-Jentkiewicz. 250-252. Warsaw: ASzWoj, 2024.
Show in Google Scholar -->>
- Kaczmarek Krzysztof, Mirosław Karpiuk, Claudio Melchior, “A Holistic Approach to Cybersecurity and Data Protection in the Age of Artificial Intelligence and Big Data” Prawo i Więź, No. 3 (2024): 103-121.
Show in Google Scholar -->>
- Karpiuk Mirosław, „Recognising an Entity as an Operator of Essential Services and Providing Cybersecurity at the National Level” Prawo i Więź, No. 4 (2022): 166-179.
Show in Google Scholar -->>
- Karpiuk Mirosław, „The Legal Status of Digital Service Providers in the Sphere of Cybersecurity” Studia Iuridica Lublinensia, No. 2 (2023): 189-201.
Show in Google Scholar -->>
- Karpiuk Mirosław, Claudio Melchior, Urszula Soler, “Cybersecurity Management in the Public Service Sector” Prawo i Więź, No. 4 (2023): 7-27.
Show in Google Scholar -->>
- Karpiuk Mirosław, Jarosław Kostrubiec, “Provincial Governor as a Body Responsible for Combating State Security Threats” Studia Iuridica Lublinensia, No. 1 (2024): 107-122.
Show in Google Scholar -->>
- Kostrubiec Jarosław, Sztuczna inteligencja a prawa i wolności człowieka. Warsaw: IWS, 2021.
Show in Google Scholar -->>
- Koulu Riikka, “Proceduralizing control and discretion: Human oversight in artificial intelligence policy” Maastricht Journal of European and Comparative Law, 6 (2020): 720-735. https://doi.org/10.1177/1023263X20978649.
Show in Google Scholar -->>
- Liu Yan, He Wang, Who on Earth Is Using Generative AI?. Washington, DC: World Bank, 2024. https://openknowledge.worldbank.org/server/api/core/bitstreams/9a202d4b-c765-4a85-8eda-add8c96df40a/content.
Show in Google Scholar -->>
- Maliszewska-Nienartowicz Justyna, Zasada proporcjonalności jako podstawa oceny legalności ograniczeń swobód rynku wewnętrznego Unii Europejskiej. Toruń: Wydawnictwo Naukowe UMK: 2020.
Show in Google Scholar -->>
- Mehta Heeket, Shanay Shah, Neil Patel, Patrik Kanani, “Classification of criminal recidivism using machine learning techniques” International Journal of Advanced Science and Technology, No. 4 (2020): 5110-5122.
Show in Google Scholar -->>
- Min Oi, Junshu Wang, “Using the Internet of Things E-Government Platform to Optimize the Administrative Management Mode” Wireless Communications and Mobile Computing” (2021). https://doi.org/10.1155/2021/2224957.
Show in Google Scholar -->>
- Moskalenko Viacheslav, Viacheslav Kharchenko, Alona Moskalenko, Boris Kuzikov, “Resilience and Resilient Systems of Artificial Intelligence: Taxonomy, Models and Methods” Algorithms, 3 (2023): 165. https://doi.org/10.3390/a16030165.
Show in Google Scholar -->>
- Nowak Zbigniew, “Agencja Cyberbezpieczeństwa – polska wersja The National Cyber Security Centre, Narodowego Centrum Cyberbezpieczeństwa Wielkiej Brytanii”, [in:] Bezpieczeństwo narodowe Rzeczypospolitej Polskiej. 25 lat członkostwa w NATO, ed. Katarzyna Chałubińska-Jentkiewicz, Krzysztof Gawkowski, Zbigniew Nowak, Łukasz Piątkowski, Krzysztof Wąsik. Gliwice: Helion, 2024.
Show in Google Scholar -->>
- Ntoutsi Erini, Pavlos Fafalios, et al. “Bias in data-driven artificial intelligence systems – An introductory survey” WIREs Data Mining and Knowledge Discovery, (2020). https://doi.org/10.1002/widm.1356.
Show in Google Scholar -->>
- Olędzka Justyna, „Zjawisko dezinformacji jako źródło zagrożeń bezpieczeństwa państwa – zarys problematyki”, [in:] Współczesne zagrożenia bezpieczeństwa, ed. Adam Jelonek. 109-118. Warsaw: ASzWoj, 2024.
Show in Google Scholar -->>
- Radoniewicz Filip, “Społeczeństwo informacyjne”, [in:] Leksykon cyberbezpieczeństwa, ed. Katarzyna Chałubińska-Jentkiewicz. 233-234. Warsaw: ASzWoj, 2024.
Show in Google Scholar -->>
- Radoniewicz Filip, “Zarządzanie ryzykiem”, [in:] Leksykon cyberbezpieczeństwa, ed. Katarzyna Chałubińska-Jentkiewicz. 290-293. Warsaw: ASzWoj, 2024.
Show in Google Scholar -->>
- Rohan Rohani, Suree Funilkul, Debajyoti Pal, Himanshu Thapliyal, “Humans in the Loop: Cybersecurity Aspects in the Consumer IoT Context” IEEE Consumer Electronics Magazine, No. 4 (2022): 78-84. doi: 10.1109/MCE.2021.3095385.
Show in Google Scholar -->>
- Sahamies Kaisu, Olga Welinder, “Orchestrating Sustainability: Government Platforms for Material Circulation” Administration and Society, No. 1 (2025): 100-128.
Show in Google Scholar -->>
- Shaji George, George Hovan, Thangaraj Baskar, Digvijay Pandey, “XDR: The Evolution of Endpoint Security Solutions – Superior Extensibility and Analytics to Satisfy the Organizational Needs of the Future” International Journal of Advanced Research in Science, Communication and Technology, 1 (2021): 493‑501. https://doi.org/10.5281/zenodo.7028219.
Show in Google Scholar -->>
- Shkarlet Serhiy, Igor Oliychenko, Maksym Dubyna, Maryna Ditkovska, Vladimir Zhovtok, “Comparative analysis of best practices in e-Government implementation and use of this experience by developing countries” Administratie si Management Public, 34 (2020): 118-136. doi: 10.24818/amp/2020.34-07.
Show in Google Scholar -->>
- Turing Alan, “Computing machinery and intelligence” Mind, 59 (1950): 433-460.
Show in Google Scholar -->>
- Tyrawa Dominik, “Krajowy system cyberbezpieczeństwa w świetle nauki prawa administracyjnego. Uwagi wybrane” International Journal of Legal Studies, No. 1 (2023): 13-30.
Show in Google Scholar -->>
- Wilson James, Paul Daugherty, “Collaborative intelligence: Humans and AI are joining forces” Harvard Business Review, 4 (2018): 114-123.
Show in Google Scholar -->>
- Włodyka Ewa Maria, “Cyberbezpieczeństwo sektora publicznego”, [in:] Leksykon cyberbezpieczeństwa, ed. Katarzyna Chałubińska-Jentkiewicz. 64-67. Warsaw: ASzWoj, 2024.
Show in Google Scholar -->>
- Włodyka Ewa Maria, „E-administracja”, [in:] Leksykon cyberbezpieczeństwa, ed. Katarzyna Chałubińska-Jentkiewicz. 112-119. Warszawa: ASzWoj, 2024.
Show in Google Scholar -->>
- Xu Yueshen, Yinchen Wu, Honghao Gao, Shengli Song, Yuyu Yin, Xichu Xiao, “Collaborative APIs recommendation for Artificial Intelligence of Things with information fusion” Future Generation Computer System, 125, C (2021): 471-479. https://doi.org/10.1016/j.future.2021.07.004.
Show in Google Scholar -->>
- Yamin Muhammad Mudassar, Mohib Ullah, Habib Ullah, Basel Katt, “Weaponized AI for cyber attacks” Journal of Information Security and Applications, Vol. LVII (2021): 102722. https://doi.org/10.1016/j.jisa.2020.102722.
Show in Google Scholar -->>
Downloads
Download data is not yet available.