Leveraging Blockchain for Ethical AI: Mitigating Digital Threats and Strengthening Societal Resilience

This position paper proposes a conceptual framework (CF-BIAI-SXT) for integrating blockchain with AI to enhance ethical governance, transparency, and privacy in high-risk AI applications that ensure societal resilience through the mitigation of sexual exploitation. Sextortion is a growing form of di...

Full description

Saved in:
Bibliographic Details
Main Authors: Chibuzor Udokwu, Roxana Voicu-Dorobanțu, Abiodun Afolayan Ogunyemi, Alex Norta, Nata Sturua, Stefan Craß
Format: Article
Language:English
Published: MDPI AG 2025-07-01
Series:Future Internet
Subjects:
Online Access:https://www.mdpi.com/1999-5903/17/7/309
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:This position paper proposes a conceptual framework (CF-BIAI-SXT) for integrating blockchain with AI to enhance ethical governance, transparency, and privacy in high-risk AI applications that ensure societal resilience through the mitigation of sexual exploitation. Sextortion is a growing form of digital sexual exploitation, and the role of AI in its mitigation and the ethical issues that arise provide a good case for this paper. Through a combination of systematic and narrative literature reviews, the paper first explores the ethical shortcomings of existing AI systems in sextortion prevention and assesses the capacity of blockchain operations to mitigate these limitations. It then develops CF-BIAI-SXT, a framework operationalized through BPMN-modeled components and structured into a three-layer implementation strategy composed of technical enablement, governance alignment, and continuous oversight. The framework is then situated within real-world regulatory constraints, including GDPR and the EU AI Act. This position paper concludes that a resilient society needs ethical, privacy-first, and socially resilient digital infrastructures, and integrating two core technologies, such as AI and blockchain, creates a viable pathway towards this desideratum. Mitigating high-risk environments, such as sextortion, may be a fundamental first step in this pathway, with the potential expansion to other forms of online threats.
ISSN:1999-5903