(or Why I think it’s important to help improve data protection in East Asia if you really care about personal data of the internet Next Billion)
a presentation from RightsCon, 4 March 2014.
Mobile technology is transforming Africa by addressing longstanding issues like poverty, food insecurity, and lack of access to information and financial services. Mobile phones have seen unprecedented growth in Africa, with over 600 million subscribers compared to just 4 million in 1998. This has led to innovative mobile applications that provide farmers with agricultural information, enable peer-to-peer payments and money transfers through mobile banking, and allow civic engagement through open data and crowdsourcing. Mobile technology is empowering citizens, boosting economic growth, and helping lift people out of poverty in Africa.
- The Indian internet market is growing rapidly but still at a low level of penetration, with 22 million users and 3% broadband penetration as of 2006. Social networking is very popular in India, with Orkut and Facebook being the top sites.
- The top native Indian social networking sites have had success by quickly copying popular features from foreign sites, targeting local users through campus and media marketing, and leveraging SMS and mobile features to reach more users. However, foreign sites still dominate due to being earlier to market and not facing language barriers in India's international environment.
The document discusses the history and current state of the internet and media in India. It provides background on the origins of the internet in the 1960s for military and research purposes. It outlines advantages like communication, information, and services as well as disadvantages such as theft of personal information and virus threats. Regarding India, it notes limited early access but now over 62 million users and growing demand. The media sector is one of India's fastest growing and includes film, television, music, radio and print. The future of both the internet and media in India depends on continued economic growth and is projected to have annual growth rates of 19% or more in coming years.
The mobile application is being developed by a team of five students from Electrical and Computer Engineering at North South University in Bangladesh. The team has experience developing 70+ mobile applications and 20+ prototypes. Their application aims to help citizens report crimes live through photos and videos while keeping their identity secret, allow face matching against a database of wanted criminals, and provide emergency voice alerts. It will make the crime reporting process faster and help law enforcement catch criminals. The app will be available on the Google Play Store and aims to make people aware of crimes and help establish peace.
The document discusses how the internet is changing media consumption habits. It notes that social media and user-generated content are driving new trends like "water cooler culture" where news spreads through casual online discussions. The internet is also fragmenting traditional media like books, music and films by emphasizing immediacy over original thought. Looking ahead, the document predicts that the internet will further blur lines between media like integrating television and computers, allowing live TV and radio on mobile devices, and enabling new forms of interactive entertainment.
Mobile technology has grown rapidly in the Middle East and North Africa region, but divides still exist. While smartphone penetration is high in places like the UAE and Qatar, many cannot afford broadband services. There are also differences in access to advanced technologies between regions. Going forward, priorities include closing digital divides, planning for new divides as newer technologies emerge, developing demand-led services, increasing Arabic digital content, and addressing privacy concerns. Reasons for optimism include the region's youth population, successful case studies of mobile services, new collaborations and infrastructure projects, and audiences finding their own solutions within existing technologies.
1. The document summarizes research from a survey of 7,325 mobile internet users across 7 African countries about their browsing behaviors and satisfaction with their devices and mobile operators.
2. It finds that over 50% of users access the mobile internet as their sole way to connect, and that most are young, male, and early adopters. Nokia devices dominate the market.
3. Users primarily download content like games and music, or use communication services like social media and email. Opera browsers facilitate more engagement like social networking and purchasing content.
Mobile technology is transforming Africa by addressing longstanding issues like poverty, food insecurity, and lack of access to information and financial services. Mobile phones have seen unprecedented growth in Africa, with over 600 million subscribers compared to just 4 million in 1998. This has led to innovative mobile applications that provide farmers with agricultural information, enable peer-to-peer payments and money transfers through mobile banking, and allow civic engagement through open data and crowdsourcing. Mobile technology is empowering citizens, boosting economic growth, and helping lift people out of poverty in Africa.
- The Indian internet market is growing rapidly but still at a low level of penetration, with 22 million users and 3% broadband penetration as of 2006. Social networking is very popular in India, with Orkut and Facebook being the top sites.
- The top native Indian social networking sites have had success by quickly copying popular features from foreign sites, targeting local users through campus and media marketing, and leveraging SMS and mobile features to reach more users. However, foreign sites still dominate due to being earlier to market and not facing language barriers in India's international environment.
The document discusses the history and current state of the internet and media in India. It provides background on the origins of the internet in the 1960s for military and research purposes. It outlines advantages like communication, information, and services as well as disadvantages such as theft of personal information and virus threats. Regarding India, it notes limited early access but now over 62 million users and growing demand. The media sector is one of India's fastest growing and includes film, television, music, radio and print. The future of both the internet and media in India depends on continued economic growth and is projected to have annual growth rates of 19% or more in coming years.
The mobile application is being developed by a team of five students from Electrical and Computer Engineering at North South University in Bangladesh. The team has experience developing 70+ mobile applications and 20+ prototypes. Their application aims to help citizens report crimes live through photos and videos while keeping their identity secret, allow face matching against a database of wanted criminals, and provide emergency voice alerts. It will make the crime reporting process faster and help law enforcement catch criminals. The app will be available on the Google Play Store and aims to make people aware of crimes and help establish peace.
The document discusses how the internet is changing media consumption habits. It notes that social media and user-generated content are driving new trends like "water cooler culture" where news spreads through casual online discussions. The internet is also fragmenting traditional media like books, music and films by emphasizing immediacy over original thought. Looking ahead, the document predicts that the internet will further blur lines between media like integrating television and computers, allowing live TV and radio on mobile devices, and enabling new forms of interactive entertainment.
Mobile technology has grown rapidly in the Middle East and North Africa region, but divides still exist. While smartphone penetration is high in places like the UAE and Qatar, many cannot afford broadband services. There are also differences in access to advanced technologies between regions. Going forward, priorities include closing digital divides, planning for new divides as newer technologies emerge, developing demand-led services, increasing Arabic digital content, and addressing privacy concerns. Reasons for optimism include the region's youth population, successful case studies of mobile services, new collaborations and infrastructure projects, and audiences finding their own solutions within existing technologies.
1. The document summarizes research from a survey of 7,325 mobile internet users across 7 African countries about their browsing behaviors and satisfaction with their devices and mobile operators.
2. It finds that over 50% of users access the mobile internet as their sole way to connect, and that most are young, male, and early adopters. Nokia devices dominate the market.
3. Users primarily download content like games and music, or use communication services like social media and email. Opera browsers facilitate more engagement like social networking and purchasing content.
This document summarizes a survey on cyber law in India. It discusses key issues and emerging challenges for cyber law in India, including security issues, ethical issues, lack of standardization, and rapidly evolving technologies. It also discusses implementations and solutions for enforcing cyber law in India, such as establishing more cyber crime cells, implementing a global techno-legal framework, and regular updates to the Information Technology Act. The survey concludes that cyber law is an evolving area with many complex issues and challenges due to the changing nature of both technology and crime, and will require ongoing research and improvements to effectively address cybercrime in India.
Global Cyber-Laws and E-Commerce & Strategic Implication for E-Commercewelcometofacebook
This document discusses cyberlaw and its implications for e-commerce. It notes that cyberlaw encompasses many areas of law, including intellectual property, internet regulations, and contract law. While there is no single "cyberlaw," various jurisdictions apply different and sometimes conflicting laws to activities in cyberspace. This can create challenges for global e-commerce firms that must navigate these legal complexities. The document also examines how contract law, intellectual property law, and jurisdiction issues apply uniquely to online commerce.
This slide is a guide to the Cyber Law regime in India. It covers up the IT Act 200 in a simple childish approach.
Shankey Gupta
Advocate
Cyber Law & Forensic Consultant.
www.shivamgupta.com
ICTs investments in MENA countries are overtaking the rest of the world but they didn’t improve their cyber legislation systems. Cybercrime in the region is rising alarmingly and there no efforts to tackle this phenomenon. Lack of legislative and technical capabilities are common factors in most Middle East countries along with poor security awareness and education. I’m delighted to introduce my latest research to address these latest cybercrime issues in the region. This research includes extensive study for Internet penetration in MENA, country by country assessment, legal frameworks, and challenges facing legislators in the region.
The document discusses cyber laws in India, specifically the Information Technology Act of 2000. It provides an overview of cyber crimes and security strategies, then summarizes the objectives and key provisions of the IT Act, including sections related to hacking, data theft, and compensation. The Act aims to recognize electronic transactions and digital signatures legally and facilitate online banking and commerce. However, challenges remain in identifying cyber criminals and lack of skilled law enforcement to deal with computer crimes.
This document discusses legal aspects of handling cyber frauds and crimes under the Information Technology Act.
It provides 3 key points:
1. It defines cyber crimes as unlawful acts using cyberspace as a tool or target, and outlines some common cyber crimes like sending threatening emails or stealing software.
2. It discusses the Indian legal framework around cyber crimes including the IT Act, Evidence Act, and laws around data privacy, hacking, identity theft and other computer-related offenses. Penalties for offenses can include fines and imprisonment.
3. It outlines the computer forensics process for investigating cyber crimes which involves identifying digital evidence, acquiring storage media, analyzing evidence, documenting findings, and presenting in court according
Cyber law governs the use of computers, the internet, and digital technology. It defines illegal access to computer systems and digital content as well as crimes like hacking and distributing obscene materials online. The Information Technology Act of 2000 is the primary law regulating cyber activity in India and outlines offenses and penalties. For example, unauthorized access to a computer system or downloading copyrighted content without permission can result in fines of up to 1 crore rupees. The act also prohibits hacking, publishing obscene materials electronically, and contributory infringement of copyright.
The document discusses various topics related to intellectual property rights including patents, copyrights, trademarks, trade secrets, and the right of publicity. It defines each type of intellectual property, provides examples, and notes whether they are governed by state or federal law. The duration of protection for each type is also mentioned. The document notes that intellectual property audits help identify overlaps between different intellectual property disciplines. It outlines the primary contexts for intellectual property audits as planning and managing intellectual property, due diligence reviews, and assessing exposure as a defendant. Finally, it lists the key ethical obligations of paralegals working in intellectual property law as confidentiality, avoiding conflicts of interest, and not engaging in unauthorized practice of law.
Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000Jyotindra Zaveri
The document discusses the results of a study on the impact of climate change on global wheat production. Researchers found that rising temperatures will significantly reduce wheat yields across different regions of the world by the end of the century. Under a high emissions scenario, the study projects a global average decrease in wheat production of 6% by 2050, and a 17% decrease by 2100, threatening global food security.
The document discusses the background and need for cyber laws in India. It outlines how the internet originated from the ARPANET network developed by the US Department of Defense. With increasing internet users, there was a rise in cyber crimes like hacking, viruses, and online fraud. This led to the passage of the Information Technology Act 2000 in India to address these issues. The key objectives of the Act were to regulate digital signatures, certifying authorities, cyber crimes and penalties. However, critics argue it does not adequately cover intellectual property or internet censorship. The document concludes by emphasizing the importance of effective cyber laws, enforcement, and judicial system to deal with cyber crimes.
Cyber law refers to laws governing the internet and online communication. Cyber laws are needed to ensure the integrity and security of information, protect intellectual property rights and privacy, and establish the legal status of online transactions. Some key cyber laws in Malaysia include the Digital Signature Act of 1997, Computer Crimes Act of 1997, and Communications and Multimedia Act of 1998. These laws aim to secure electronic communications, protect against computer crimes, and ensure high levels of user confidence in Malaysia's information and communication technology industry.
This document discusses cyber crime and cyber law. It defines cybercrime as any illegal act committed using a computer network, and provides examples such as child pornography, threatening emails, identity theft, and software piracy. The document classifies cybercrimes as offenses against data/systems, content-related offenses, and copyright offenses. It also discusses the need for cyber law to address challenges in applying traditional law to computer-related crimes and technologies.
An Introduction to Cyber Law - I.T. Act 2000 (India)Chetan Bharadwaj
An Introduction to Cyber Law - Chetan Bharadwaj
The modern thief can steal more with a computer than with a gun. Tomorrow's terrorist may be able to do more damage with a keyboard than with a bomb.
The Information Technology Act 2000 provides a legal framework for electronic commerce and digital signatures. It aims to facilitate electronic governance and amend various laws to apply in the digital context. The Act defines cyber crimes and sets penalties for offenses involving unauthorized computer access, cyber attacks, and tampering with digital records. It establishes authorities for issuing digital certificates and adjudicating cyber disputes, while limiting the jurisdiction of regular courts on technology-related matters.
Cyber crime involves unlawful activities using computers and the internet. The document categorizes cyber crimes as those using computers to attack other computers or as tools to enable real-world crimes. It provides examples of various cyber crimes like hacking, child pornography, viruses, and cyber terrorism. It stresses the importance of cyber security to defend against attacks through prevention, detection and response. The document advises safety tips like using antivirus software, firewalls, and strong passwords. India's cyber laws address both traditional crimes committed online and new crimes defined in the Information Technology Act.
The document discusses the influence of Japan and China on future mobile technologies and digital trends. It notes that while Japan dominated mobile hardware, its influence will be more in software and platforms. China is described as a rising economic power with a large population that is highly engaged online through social media and mobile devices. Localization and a supportive government have helped China develop a unique digital ecosystem. The document cautions against underestimating China and its global ambitions.
ebusiness Strategy in Entrepreneurship 1: Pedro Eloy at SMECC - 20130806smecchk
This document provides an overview of an e-business strategy workshop. It discusses understanding the evolving digital landscape and opportunities, identifying different types of digital entrepreneurs, setting goals and next steps, and considering skills and activities needed. Key topics covered in the workshop include social media, video, engagement, design, usability, e-commerce trends in China and mobile commerce. Frameworks on e-business, strategy, and the Gartner Hype Cycle are also mentioned. Examples of innovative education platforms like Khan Academy and trends in e-government and improving government communication are briefly discussed.
Sigit policy framework on public sector social media utilization- moving fo...Sigit Puspito Wigati Jarot
Power Paradox of Socmed
Big data is touted as a powerful tool that enables its users to view a sharper and clearer picture of the world. For example, many Arab Spring protesters and commentators credited social media for helping protesters to organize.
But big data sensors and big data pools are predominantly in the hands of powerful intermediary institutions, not ordinary people. Seeming to learn from Arab Spring organizers, the Syrian regime feigned the removal of restrictions on its citizens’ Facebook, Twitter, and YouTube usage only to secretly profile, track, and round up dissidents.
Neil M. Richards & Jonathan H. King, Three Paradoxes of Big Data, 66 STAN. L. REV. ONLINE 41 (2013).
Issues to be addressed in Policy Frameworks
User data and privacy must be protected.
In the case of lack awareness about privacy, proactive efforts by the government and regulators is required
Socmed OTT issues:
Fair revenue-sharing between socmed OTT and network operators, to ensure sustainability in network development.
Encourage the development and use of domestic OTT.
Government must have control to maintain all national interest and national sovereignty related aspects.
Sigit policy framework on public sector social media utilization- moving fo...Sigit Puspito Wigati Jarot
Power Paradox of Socmed
Big data is touted as a powerful tool that enables its users to view a sharper and clearer picture of the world. For example, many Arab Spring protesters and commentators credited social media for helping protesters to organize.
But big data sensors and big data pools are predominantly in the hands of powerful intermediary institutions, not ordinary people. Seeming to learn from Arab Spring organizers, the Syrian regime feigned the removal of restrictions on its citizens’ Facebook, Twitter, and YouTube usage only to secretly profile, track, and round up dissidents.
Neil M. Richards & Jonathan H. King, Three Paradoxes of Big Data, 66 STAN. L. REV. ONLINE 41 (2013).
Issues to be addressed in Policy Frameworks
User data and privacy must be protected.
In the case of lack awareness about privacy, proactive efforts by the government and regulators is required
Socmed OTT issues:
Fair revenue-sharing between socmed OTT and network operators, to ensure sustainability in network development.
Encourage the development and use of domestic OTT.
Government must have control to maintain all national interest and national sovereignty related aspects.
This document provides an overview of mobile innovation trends in Southeast Asia. It finds the region is a crossroads for mobile innovation, with diverse cultures and economies. Mobile infrastructure is advancing, with 4G networks emerging. Smartphone and tablet use is booming, with Indonesia having the largest smartphone market. Mobile payments are growing in popularity for online shopping and apps, with Singapore the most ready for mobile payments adoption. The region shows strong potential for continued mobile sector growth.
This document summarizes a survey on cyber law in India. It discusses key issues and emerging challenges for cyber law in India, including security issues, ethical issues, lack of standardization, and rapidly evolving technologies. It also discusses implementations and solutions for enforcing cyber law in India, such as establishing more cyber crime cells, implementing a global techno-legal framework, and regular updates to the Information Technology Act. The survey concludes that cyber law is an evolving area with many complex issues and challenges due to the changing nature of both technology and crime, and will require ongoing research and improvements to effectively address cybercrime in India.
Global Cyber-Laws and E-Commerce & Strategic Implication for E-Commercewelcometofacebook
This document discusses cyberlaw and its implications for e-commerce. It notes that cyberlaw encompasses many areas of law, including intellectual property, internet regulations, and contract law. While there is no single "cyberlaw," various jurisdictions apply different and sometimes conflicting laws to activities in cyberspace. This can create challenges for global e-commerce firms that must navigate these legal complexities. The document also examines how contract law, intellectual property law, and jurisdiction issues apply uniquely to online commerce.
This slide is a guide to the Cyber Law regime in India. It covers up the IT Act 200 in a simple childish approach.
Shankey Gupta
Advocate
Cyber Law & Forensic Consultant.
www.shivamgupta.com
ICTs investments in MENA countries are overtaking the rest of the world but they didn’t improve their cyber legislation systems. Cybercrime in the region is rising alarmingly and there no efforts to tackle this phenomenon. Lack of legislative and technical capabilities are common factors in most Middle East countries along with poor security awareness and education. I’m delighted to introduce my latest research to address these latest cybercrime issues in the region. This research includes extensive study for Internet penetration in MENA, country by country assessment, legal frameworks, and challenges facing legislators in the region.
The document discusses cyber laws in India, specifically the Information Technology Act of 2000. It provides an overview of cyber crimes and security strategies, then summarizes the objectives and key provisions of the IT Act, including sections related to hacking, data theft, and compensation. The Act aims to recognize electronic transactions and digital signatures legally and facilitate online banking and commerce. However, challenges remain in identifying cyber criminals and lack of skilled law enforcement to deal with computer crimes.
This document discusses legal aspects of handling cyber frauds and crimes under the Information Technology Act.
It provides 3 key points:
1. It defines cyber crimes as unlawful acts using cyberspace as a tool or target, and outlines some common cyber crimes like sending threatening emails or stealing software.
2. It discusses the Indian legal framework around cyber crimes including the IT Act, Evidence Act, and laws around data privacy, hacking, identity theft and other computer-related offenses. Penalties for offenses can include fines and imprisonment.
3. It outlines the computer forensics process for investigating cyber crimes which involves identifying digital evidence, acquiring storage media, analyzing evidence, documenting findings, and presenting in court according
Cyber law governs the use of computers, the internet, and digital technology. It defines illegal access to computer systems and digital content as well as crimes like hacking and distributing obscene materials online. The Information Technology Act of 2000 is the primary law regulating cyber activity in India and outlines offenses and penalties. For example, unauthorized access to a computer system or downloading copyrighted content without permission can result in fines of up to 1 crore rupees. The act also prohibits hacking, publishing obscene materials electronically, and contributory infringement of copyright.
The document discusses various topics related to intellectual property rights including patents, copyrights, trademarks, trade secrets, and the right of publicity. It defines each type of intellectual property, provides examples, and notes whether they are governed by state or federal law. The duration of protection for each type is also mentioned. The document notes that intellectual property audits help identify overlaps between different intellectual property disciplines. It outlines the primary contexts for intellectual property audits as planning and managing intellectual property, due diligence reviews, and assessing exposure as a defendant. Finally, it lists the key ethical obligations of paralegals working in intellectual property law as confidentiality, avoiding conflicts of interest, and not engaging in unauthorized practice of law.
Hacking - Cyber Crimes and Cyber Laws - Information Technology ACT 2000Jyotindra Zaveri
The document discusses the results of a study on the impact of climate change on global wheat production. Researchers found that rising temperatures will significantly reduce wheat yields across different regions of the world by the end of the century. Under a high emissions scenario, the study projects a global average decrease in wheat production of 6% by 2050, and a 17% decrease by 2100, threatening global food security.
The document discusses the background and need for cyber laws in India. It outlines how the internet originated from the ARPANET network developed by the US Department of Defense. With increasing internet users, there was a rise in cyber crimes like hacking, viruses, and online fraud. This led to the passage of the Information Technology Act 2000 in India to address these issues. The key objectives of the Act were to regulate digital signatures, certifying authorities, cyber crimes and penalties. However, critics argue it does not adequately cover intellectual property or internet censorship. The document concludes by emphasizing the importance of effective cyber laws, enforcement, and judicial system to deal with cyber crimes.
Cyber law refers to laws governing the internet and online communication. Cyber laws are needed to ensure the integrity and security of information, protect intellectual property rights and privacy, and establish the legal status of online transactions. Some key cyber laws in Malaysia include the Digital Signature Act of 1997, Computer Crimes Act of 1997, and Communications and Multimedia Act of 1998. These laws aim to secure electronic communications, protect against computer crimes, and ensure high levels of user confidence in Malaysia's information and communication technology industry.
This document discusses cyber crime and cyber law. It defines cybercrime as any illegal act committed using a computer network, and provides examples such as child pornography, threatening emails, identity theft, and software piracy. The document classifies cybercrimes as offenses against data/systems, content-related offenses, and copyright offenses. It also discusses the need for cyber law to address challenges in applying traditional law to computer-related crimes and technologies.
An Introduction to Cyber Law - I.T. Act 2000 (India)Chetan Bharadwaj
An Introduction to Cyber Law - Chetan Bharadwaj
The modern thief can steal more with a computer than with a gun. Tomorrow's terrorist may be able to do more damage with a keyboard than with a bomb.
The Information Technology Act 2000 provides a legal framework for electronic commerce and digital signatures. It aims to facilitate electronic governance and amend various laws to apply in the digital context. The Act defines cyber crimes and sets penalties for offenses involving unauthorized computer access, cyber attacks, and tampering with digital records. It establishes authorities for issuing digital certificates and adjudicating cyber disputes, while limiting the jurisdiction of regular courts on technology-related matters.
Cyber crime involves unlawful activities using computers and the internet. The document categorizes cyber crimes as those using computers to attack other computers or as tools to enable real-world crimes. It provides examples of various cyber crimes like hacking, child pornography, viruses, and cyber terrorism. It stresses the importance of cyber security to defend against attacks through prevention, detection and response. The document advises safety tips like using antivirus software, firewalls, and strong passwords. India's cyber laws address both traditional crimes committed online and new crimes defined in the Information Technology Act.
The document discusses the influence of Japan and China on future mobile technologies and digital trends. It notes that while Japan dominated mobile hardware, its influence will be more in software and platforms. China is described as a rising economic power with a large population that is highly engaged online through social media and mobile devices. Localization and a supportive government have helped China develop a unique digital ecosystem. The document cautions against underestimating China and its global ambitions.
ebusiness Strategy in Entrepreneurship 1: Pedro Eloy at SMECC - 20130806smecchk
This document provides an overview of an e-business strategy workshop. It discusses understanding the evolving digital landscape and opportunities, identifying different types of digital entrepreneurs, setting goals and next steps, and considering skills and activities needed. Key topics covered in the workshop include social media, video, engagement, design, usability, e-commerce trends in China and mobile commerce. Frameworks on e-business, strategy, and the Gartner Hype Cycle are also mentioned. Examples of innovative education platforms like Khan Academy and trends in e-government and improving government communication are briefly discussed.
Sigit policy framework on public sector social media utilization- moving fo...Sigit Puspito Wigati Jarot
Power Paradox of Socmed
Big data is touted as a powerful tool that enables its users to view a sharper and clearer picture of the world. For example, many Arab Spring protesters and commentators credited social media for helping protesters to organize.
But big data sensors and big data pools are predominantly in the hands of powerful intermediary institutions, not ordinary people. Seeming to learn from Arab Spring organizers, the Syrian regime feigned the removal of restrictions on its citizens’ Facebook, Twitter, and YouTube usage only to secretly profile, track, and round up dissidents.
Neil M. Richards & Jonathan H. King, Three Paradoxes of Big Data, 66 STAN. L. REV. ONLINE 41 (2013).
Issues to be addressed in Policy Frameworks
User data and privacy must be protected.
In the case of lack awareness about privacy, proactive efforts by the government and regulators is required
Socmed OTT issues:
Fair revenue-sharing between socmed OTT and network operators, to ensure sustainability in network development.
Encourage the development and use of domestic OTT.
Government must have control to maintain all national interest and national sovereignty related aspects.
Sigit policy framework on public sector social media utilization- moving fo...Sigit Puspito Wigati Jarot
Power Paradox of Socmed
Big data is touted as a powerful tool that enables its users to view a sharper and clearer picture of the world. For example, many Arab Spring protesters and commentators credited social media for helping protesters to organize.
But big data sensors and big data pools are predominantly in the hands of powerful intermediary institutions, not ordinary people. Seeming to learn from Arab Spring organizers, the Syrian regime feigned the removal of restrictions on its citizens’ Facebook, Twitter, and YouTube usage only to secretly profile, track, and round up dissidents.
Neil M. Richards & Jonathan H. King, Three Paradoxes of Big Data, 66 STAN. L. REV. ONLINE 41 (2013).
Issues to be addressed in Policy Frameworks
User data and privacy must be protected.
In the case of lack awareness about privacy, proactive efforts by the government and regulators is required
Socmed OTT issues:
Fair revenue-sharing between socmed OTT and network operators, to ensure sustainability in network development.
Encourage the development and use of domestic OTT.
Government must have control to maintain all national interest and national sovereignty related aspects.
This document provides an overview of mobile innovation trends in Southeast Asia. It finds the region is a crossroads for mobile innovation, with diverse cultures and economies. Mobile infrastructure is advancing, with 4G networks emerging. Smartphone and tablet use is booming, with Indonesia having the largest smartphone market. Mobile payments are growing in popularity for online shopping and apps, with Singapore the most ready for mobile payments adoption. The region shows strong potential for continued mobile sector growth.
[2014 q2q3umeng insight] China’s Mobile Internet:Further Segmentation and Ver...Umeng
In the third quarter of 2014, the number of active smart devices in China exceeded 900 million, with a growth rate of 8.4%. Within one month after iPhone6 and iPhone6 plus were launched, the total active market in China increased by 14 times.
The number of 4G sessions has grown by 30 times since the beginning of 2014. 4G users expanded from northern and eastern China (where cities were better developed) to other regions.
Less frequent users(launching app for less than 5 days per month) accounts for 55% of all users, and they represent a huge market potential. System tools, video apps and games are their largest demand. Frequent users(launching app for more than 15 days per month) launch nearly 10 apps every day. Entertainment and SNS apps are their largest demand.
SNS, news and other apps supporting life and work have the highest retention rate. Apps in areas with more auxiliary functions in life, like SNS, E-commerce, News & finance, grew faster in vertical fields.
The ratio of jailbroken iOS devices, after reaching an all time low, climbed up to 13.6% in September. The most frequently used apps on those jailbroken devices are video and games.
Active smart devices in China exceeded 900 million in Q3 2014, growing 8.4% from the previous quarter. The launch of the iPhone 6 and 6 Plus caused iOS devices to increase 14 times within a month. 4G sessions grew 30 times since early 2014 and expanded beyond northern and eastern China. Less frequent users, launching apps less than 5 days a month, account for 55% of users and have significant potential. System tools, video, and games are most demanded. Frequent users launch nearly 10 apps daily with top demands being entertainment and social media.
Digital Asia – ASEAN in ascendence. Team Finland Future Watch Report, May 2016Didar Kaitasalo
In Asia, three trends are driving digitalisation: mobile commerce, business intelligence and smart infrastructures. These will have a significant short- to midterm impact on companies and customers, and ways of doing business. See how digital transformation is shaping the future business landscape in Singapore, Vietnam and Philippines. Areas covered: Fintech: New lending models, mobile payments, blockchain
Digital Asia – ASEAN in ascendence. Team Finland Future Watch Report, May 2016Team Finland Future Watch
In Asia, three trends are driving digitalisation: mobile commerce, business intelligence and smart infrastructures. These will have a significant short- to midterm impact on companies and customers, and ways of doing business. See how digital transformation is shaping the future business landscape in Singapore, Vietnam and Philippines. Areas covered: Fintech: New lending models, mobile payments, blockchain.
Threading it all together – Q2 Tech TrendsKatie Harbath
The document provides a quarterly report on technology and democracy trends for Q2 2023. Key points discussed include:
- AI and social media platforms like Twitter and its clones continued to dominate conversations about their potential impacts on democracy.
- US courts played an increasing role in technology policy through various cases, and more rulings are expected around the 2024 elections.
- Discussion around banning TikTok faded but related legal challenges continue in courts.
- The first 2024 GOP primary debate was scheduled for August 23rd, with campaigns experimenting with new digital tactics including AI.
- Upcoming events like court cases and the primary debate will influence the technology and policy discussions around elections over the next
The interpretation of the relationship among big data, IoT and smart city - C...Antenna Manufacturer Coco
Big data is an intangible means of production in the information society. Its concept has been repeatedly interpreted by various sectors of the society. However, many people are unclear about the relationship between the big data, the Internet of Things, and the smart city. In this regard, Tong Fang Internet of Things Industrial Technology Division Zhao Ying made a detailed interpretation of this.
Why tech-giants move their outsourcing operations to Vietnam- whitepaperTMA Solutions
Major tech giants like Intel, Samsung, Nokia, and others have established outsourcing operations in Vietnam due to its competitive advantages as an outsourcing destination. Key factors driving this include Vietnam's low labor costs which are 90% lower than in the US, favorable tax incentives, a large skilled labor force, socio-economic stability, cultural similarities with the West, and the government's push to develop the IT sector. The document provides an overview of the tech companies in Vietnam and outlines reasons for their growth in the country like cost effectiveness, tax benefits, workforce quality, and political stability.
The document discusses mobile app trends in China in 2013. It finds that:
1) The number of active smart devices in China exceeded 700 million by the end of 2013, with news, health/fitness, social networking, business and navigation among the fastest growing app categories.
2) Socializing apps through links to services like Weibo, WeChat and QQ is key to success, as app content sharing to social platforms tripled over the last 6 months of 2013.
3) High-end smartphones over $500 USD had a significant market share in China, and social networking apps were among the top growing categories as new forms of social media became popular.
China Mobile Internet 2013 Overview (Umeng)Hubery Zhou
The number of active smart devices in China exceeded 700 Million by the end of 2013.
The five fastest growing mobile apps categories (excluding games) are: news, health & fitness, social networking, business, and navigation. These areas will bring new opportunities for developers in 2014.
Socializing your apps is the key to success for developers. Currently among the top 1,000 apps (apps and games) in the Chinese market, 55% of them provide links to Chinese social networking services (e.g. Sina Weibo, Wechat, QQ, Renren). The amount of app content sharing to social network platforms per mobile Internet user per day has tripled in the last 6 months.
Social network sharing in game has become incredibly popular on all social networking platforms, 48% of in app sharing traffic to social networks are from games.
Internet Governance & Digital Rights by Waihiga K. Muturi, Rtn..pdfWAIHIGA K.MUTURI
Waihiga is a serial social entrepreneur, accredited digital journalist, and communications expert working to tackle poverty in Africa through social enterprises and stories. They have extensive experience running both online and offline campaigns around issues like ending police brutality, advocating for digital rights, and challenging internet shutdowns in countries like Nigeria, Sudan, and Zambia. The document provides an overview of Waihiga's background and campaigns and outlines some of the key issues, actors, and trends related to internet governance and digital rights in Africa.
This document provides an overview and analysis of Tencent, a Chinese technology company. It explores Tencent's services, strategy, business models, and the factors that led to its success in becoming China's largest online community. The document was published by Plus Eight Star Ltd to share insights about Tencent's approach and help other companies learn from its practices and business models. It is based on research conducted over two years, including interviews with Tencent executives and experts. The document aims to help social networks, gaming companies, telecom carriers, media groups, and investors understand Tencent's approach to building a large user base, generating revenue, and creating an online ecosystem.
WeChat, the shape of the connected ChinaFabernovel
Impressive, intriguing China is all too often dismissed as a source of inspiration for being “too different”. Yet over the past decade, China has undergone unprecedented change as a result of the implementation of protectionist economic policies. No longer the world’s sweatshop, the country is now the international epicenter of technological research & development.
Similar to Who will control the Next Billion? – A Case of Chat Apps from Asia (#RightsCon 2014) (20)
An invitation to wider stakeholders analysis in digital retail.
Focusing on challenges to civil/labor/consumer rights and social impacts.
Prepared for Institute of Asian Studies, Chulalongkorn University’s seminar on digital retail in Southeast Asia.
เสวนาว่าด้วยเรื่อง "ร่องรอยทางอิเล็กทรอนิกส์"
กิจกรรมในนิทรรศการ "หนูอยากโดนอุ้ม"
สาขาวิชาสื่อศิลปะและการออกแบบสื่อ คณะวิจิตรศิลป์ มหาวิทยาลัยเชียงใหม่
9 พ.ค. 2560
From a seminar on the (dis/re)appearance of evidence in the digital world. Presented at Chiang Mai University Art Center, during Media Arts and Design student thesis exhibition. 9 May 2017. Discussing electronic evidence, knowledge, digital forensics, surveillance, sousveillance, and data obfuscation.
Three-Layer Model for the Control of Online Content: A Study on ThailandArthit Suriyawongkul
Points of control, at Content level, Platform level, and Network level. - The deeper layer the control digging down, the more collateral damage, the more unrelated people got affected.
To censor something, the content needed to be known first. In online/electronic communication context, freedom of expression and privacy cannot be considered separately.
Presented on 17 July 2017 at 13th International Conference on Thai Studies, Chiang Mai. / Arthit Suriyawongkul, Foundation for Internet and Civic Culture
Mapping Stakeholders, Decision-makers, and Implementers in Thailand’s Cyber P...Arthit Suriyawongkul
Case Study 1 from the Internet Policy and Advocacy: Research Methods Workshop for South and Southeast Asia Actors
10 April 2017 at National Law University Delhi
Arthit Suriyawongkul, Thai Netizen Network
#AsiaInternetPolicy
More than Communication Surveillance: Data Protection in the Age of Big Data.
Discussing about re-identification issues, with focus on database for development/aid/public services.
Presented at "Next Generation Technologies for Empowering People" workshop (Frontiers Learning Series) — 14 November 2016, Asia Regional Training Center (ARTC) Bangkok, USAID Regional Development Mission for Asia (RDMA)
https://sites.google.com/site/frontierslearningseries2016/
Communication surveillance and database surveillance.
Their collateral damages and other unintended consequences.
Cases from Thailand, US, and South Korea.
Presented at Digital Citizen Summit 2016
11 Nov 2016, Bangalore
----
@bact Arthit Suriyawongkul
@thainetizen Thai Netizen Network
Some concerns on laws and regulations about information and expression in Cambodia, Myanmar, Thailand, and Vietnam.
Presented during Mekong ICT Camp 2015 discussion on how information laws could affect ICT for Development projects, like community wifi and data journalism.
June 2015
Introduction to Foundation for Internet and Civic Culture
แนะนำองค์กร วัตถุประสงค์ แหล่งทุน และตัวอย่างกิจกรรมของมูลนิธิเพื่ออินเทอร์เน็ตและวัฒนธรรมพลเมือง
Changes and trends in Thailand’s national information and communications policy after the 2014 coup
presented at Asia Pacific Regional Internet Governance Forum
5 August 2014, Delhi
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframePrecisely
Inconsistent user experience and siloed data, high costs, and changing customer expectations – Citizens Bank was experiencing these challenges while it was attempting to deliver a superior digital banking experience for its clients. Its core banking applications run on the mainframe and Citizens was using legacy utilities to get the critical mainframe data to feed customer-facing channels, like call centers, web, and mobile. Ultimately, this led to higher operating costs (MIPS), delayed response times, and longer time to market.
Ever-changing customer expectations demand more modern digital experiences, and the bank needed to find a solution that could provide real-time data to its customer channels with low latency and operating costs. Join this session to learn how Citizens is leveraging Precisely to replicate mainframe data to its customer channels and deliver on their “modern digital bank” experiences.
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...alexjohnson7307
Predictive maintenance is a proactive approach that anticipates equipment failures before they happen. At the forefront of this innovative strategy is Artificial Intelligence (AI), which brings unprecedented precision and efficiency. AI in predictive maintenance is transforming industries by reducing downtime, minimizing costs, and enhancing productivity.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
A Comprehensive Guide to DeFi Development Services in 2024Intelisync
DeFi represents a paradigm shift in the financial industry. Instead of relying on traditional, centralized institutions like banks, DeFi leverages blockchain technology to create a decentralized network of financial services. This means that financial transactions can occur directly between parties, without intermediaries, using smart contracts on platforms like Ethereum.
In 2024, we are witnessing an explosion of new DeFi projects and protocols, each pushing the boundaries of what’s possible in finance.
In summary, DeFi in 2024 is not just a trend; it’s a revolution that democratizes finance, enhances security and transparency, and fosters continuous innovation. As we proceed through this presentation, we'll explore the various components and services of DeFi in detail, shedding light on how they are transforming the financial landscape.
At Intelisync, we specialize in providing comprehensive DeFi development services tailored to meet the unique needs of our clients. From smart contract development to dApp creation and security audits, we ensure that your DeFi project is built with innovation, security, and scalability in mind. Trust Intelisync to guide you through the intricate landscape of decentralized finance and unlock the full potential of blockchain technology.
Ready to take your DeFi project to the next level? Partner with Intelisync for expert DeFi development services today!
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Digital Marketing Trends in 2024 | Guide for Staying AheadWask
https://www.wask.co/ebooks/digital-marketing-trends-in-2024
Feeling lost in the digital marketing whirlwind of 2024? Technology is changing, consumer habits are evolving, and staying ahead of the curve feels like a never-ending pursuit. This e-book is your compass. Dive into actionable insights to handle the complexities of modern marketing. From hyper-personalization to the power of user-generated content, learn how to build long-term relationships with your audience and unlock the secrets to success in the ever-shifting digital landscape.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Who will control the Next Billion? – A Case of Chat Apps from Asia (#RightsCon 2014)
1. Who will control the
Next Billion? – A Case
of Chat Apps from Asia
(or Why I think it’s important to help improve data protection in East
Asia if you really care about personal data of the internet Next Billion)
@bact
Arthit Suriyawongkul
Thai Netizen Network
Silicon Valley, 4 March 2014
2. Lead to Summary
●
Mobile chat apps are now everywhere in East
and Southeast Asia
–
–
●
becomes a mobile identity – provides authentication service for 3rd party apps
mobile social network platform – built for mobile from day one (unlike Facebook)
These “chat apps” grow globally fast
–
–
●
manufacturing influence (bundled to mobile handsets)
“soft-power” cultural influence (K-Pop, J-Pop, Manga)
Data of the mobile Next Billion will be more
transmitted to/processed in East Asia
3. Summary
●
●
Data will no longer concentrated in US/Europe,
so should the attention of data protection too?
Human rights standards so vary in other parts of
the world and the protection may not cross-border
–
●
e.g. ASEAN Human Rights Declaration
Privacy/cyber-security laws of East Asian
jurisdictions will affect more people globally
–
your communication data and personal data could be one day regulated by Chinese law
–
through monetary and educational assistants, China and Japan already have influence
in SE Asia cyber-security policy
8. How Big They Are Now?
Chat App
WhatsApp
Country
of Origin
US
Number of
Users
400M
Line
Japan
300M
(50M in Japan)
WeChat
China
300M
(200M in China)
KakaoTalk
Korea
130M
ChatON
Korea
100M
9. Growth Trends
●
●
●
●
“Line, WeChat: Asian social networks move to
conquer Europe” – AFP (29 Sep 2013)
“How WeChat, Line plan to taken on Facebook,
Skype” – The Times of India (30 Sep 2013)
“Asian Messaging Apps WeChat and Line Challenge
Silicon Valley. China’s WeChat and Japan’s Line Are
Threatening the Global Growth of WhatsApp and
Facebook.” – The Wall Street Journal (9 Oct 2013)
… and the Facebook’s WhatsApp deal recently
10. Where is the Next Billion?
●
Mobile internet users in Africa, China, South
America, South Asia and Southeast Asia
12. Protections Across Borders
“We want LINE Corp. to be the the first line of
surveillance and send us any ‘suspicious’ activity
on their app.” – Technology Crime Suppression
Division, Royal Thai Police (2013)
LINE Corp. in Japan said there’s no official
request from Thai Police. Any request for personal
data should be done under Japanese law.
http://advocacy.globalvoicesonline.org/2013/08/19/thailand-wants-to-monitor-conversations-on-line-app/
http://www.telecomasia.net/content/naver-denies-collaborating-thai-govt
13. Violations Across Borders
●
●
●
●
●
Some Chinese keywords got
censored in LINE
Study from Citizen Lab found
regionally-based Keyword
Censorship in LINE
LINE in China operated by a
Chinese company
Censorship follows user,
go across borders
https://citizenlab.org/2013/11/asia-chats-investigating-regionally-ba
sed-keyword-censorship-line/
14. Assumption (That Not Goes)
Across Borders
●
LINE did no encryption on 2G/3G network
●
Metadata and entire conversations in plain text
●
●
With small changes in data request string, can
pull historical chat logs up to two months old.
Made a wrong assumption that the 2G/3G
network is already secure (in many countries, it’s
not)
●
http://www.telecomasia.net/blog/content/line-vulnerable-man-middle-attack
●
https://citizenlab.org/2013/11/asia-chats-analyzing-information-controls-privacy-asian-messaging-applications/
15. Who will control the Next Billion?
●
●
●
●
South Korea, Japan, China, and Taiwan are
exporters of popular IT apps and devices. These
countries have huge influence in Southeast Asia
and emerging markets.
Political, economical, and/or cultural.
LINE is based in Japan. A subsidiary of a South
Korean company. LINE China (“Lianwo”) is
operated by a Chinese licensee.
WeChat (“Weixin”) is based in China.
16. Japan/China Influences on
Cyberpolicy (tech/law) in SE Asia
●
●
●
●
●
●
Japan-ASEAN Information Security Policy Meeting
Japan-ASEAN Ministerial Policy Meeting on Cyber
Security Cooperation
ASEAN Smart Network Initiative
ASEAN-Japan Joint Information Security Awareness
Raising Initiatives
China-ASEAN Defence Ministers' Meeting
ASEAN-China Information Superhighway Working
Group
17. Asian values in your pocket
●
●
●
●
As these chat apps/social network are growing, more data
will be transmitted to, stored and processed in East Asia.
“Asian values” embedded in these countries’ information
laws will play more role in information freedom globally.
Often times, in these countries, companies
cooperate/collaborate with authority. No Transparency
Report. Communication protocol is not open. Everything is
behind the door.
Asian values? From Japan? From South Korea? From
China? From where?
19. Together, we can do more of this
EFF’s “Who's Doing What?” (Tech)
EFF’s “Who Has Your Back?” (Law)
and this...
?????
?????
?????
?????
?????
20. @bact
Arthit Suriyawongkul
Thai Netizen Network
arthit@thainetizen.org
●
Parts of this presentation was presented at
●
Regional Consultation on Freedom of Expression for Civil
Liberties in Asia (22 Nov 2013, Bangkok)
●
●
●
CNXP (6 Dec 2013, Chiang Mai)
FOSSASIA (1 Mar 2014, Phnom Penh)
Thanks for all the comments from those forums and social media.