SlideShare a Scribd company logo
1 of 23
Download to read offline
走出IT人才荒
研討會
莫乃光
立法會議員(資訊科技界)
2015.10.27
IT業人力需求持續上升
過去10年增加30%
2014逾8萬2千人
未來4年估計每年需
4800名新人入行
職業訓練局資訊科技訓練發展委員會 《2014年資訊科技業人力調查報告》
2015上半年IT界增聘欲達40%
較去年同期大增14%
IT業普遍加薪4.5-5%
《工商界增聘欲強 IT升至40%》經濟日報 2015-04-03
市場渴求IT人才
2015上半年香港IT界最熱門職位
• 商業分析
• 流動應用程式開發
• 雲端技術
• 資訊保安
多重專長更吃香?
項目管理 x 商業分析 x 應用支援
Robert Walters Hong Kong Market Update 2015年9月
外判合約職位流行
31%
外判IT員工超過10%
5%
外判IT員工超過50%
全港最大IT外判機構
- 政府
- 軟件及服務供應商
- 銀行及金融業
Manpower 2014年調查,訪問本地IT管理層
政府增加T合約員工, 但減少招聘
0
500
1000
1500
2000
2500
3000
2012 2013 2014
直接聘用
T合約
莫乃光議員就審核2015-16年度開支預算書面諮詢(答覆編號 CEDB(CT)148)
40人
2015-16政府計劃招聘二級系統分
析/程序編制主任
8人
成功申請公務員的T合約員工
(2012-14年)
令人憂慮 - 中學ICT科學生銳減
未來IT業
人才供應
和質素
將成瓶頸
莫乃光議員辦事處
香港IT界員工工作狀況
問卷調查結果
Office of Charles Mok
Survey results on Hong Kong IT
workers’ work conditions and career
2015.8 – 2015.9
1258
回應 responses
受訪者背景
background
79% 全職長工 Perm. FT
12.6% 合約職位
90% 男性 Male
79.5% 25-44 歲 age
75% IT業年資6年+ experience 6+ yrs
頭3位受僱職位 Top 3 modes of employment
IT公司職員
Staff in an IT Company
企業IT部門員工
in-house IT department staff
外判IT員工(包括政府部門)
Contracted IT staff (Inc. government)
工作種類頭3位 Top 3 job descriptions
29.3%
軟件及系統開發 Software and Systems Development
15.9%
系統管理及維護 Systems Management and Maintenance
13.5%
資訊網絡及基建 Information Networks and Infrastructure
每星期平均
工作時數
Average number of working hours
per week
小時 hours
40 or less
41-45
46-50
51-60
61 hours+
41-45小時 37%
46-50小時 28.1%
51-60小時 15.9%
近半受訪者每週須超時工作
1-5小時
38%受訪者
每週超時工作6-15小時
OT
工作現況:
30.1% 月薪$30-50K
54.5% 於目前職位1-3年
55.7% 滿意-非常滿意目前工作(6分或以上)
IT人點睇自己份工?
How do IT workers view their job?
頭5位 Top 5
1. 專門知識要求多 require lots of professional knowledge
2. 晉升緩慢 slow career progression
3. 需不斷進修技能 require continuous studies
4. 工作壓力大 stressful working environment
5. 薪酬福利欠佳 remuneration unsatisfactory
香港IT人如何考慮職位?
How do local IT workers consider an opportunity?
最重要 較次要
89.6% 薪酬福利 48% 分紅/股權
88% 個人發展前景 56.9% 工作地點
84.1% 管理文化 60.7% 靈活上班安排
83.4% 行業發展前景 61.3% 進修機會
78.6% 學習/加強專業技能機會 62.4% 工作具挑戰性
百分比為認為『重要』及『非常重要』
香港IT人的願望 What do HK IT workers want?
73.9%
繼續晉升 promote in current job
58.1%
轉工(同一工種) change job with
similar nature
55%
到其他地方發展 work in another
location
70%
升職加薪
67.2%
五天工作週 5 day working week
51.4%
彈性上班時間 Flexi-hours
事業發展 Career 工作安排 Work arrangement
40.9%
轉工
change job
10.5%
離開IT界
leave IT field
23.7%
維持原狀
remain the same
5年內你打算 In 5 years ...
12.9%
創業
start a business
66.9% 擴闊人脈 networking
48.7%
考取專業資格 obtain
professional
qualifications
打算如何幫助自己在IT專業發展?How will you develop your IT career?
47.7%
進修
Further study
你最希望政府對IT界提供哪方面的支
援?
Wanted: IT policy support by the government?
按最多贊成次序:
1.設立IT界專業進修資助 Subsidy for IT professional development and further studies
2.推動更多企業運用ICT Promote ICT usage in more enterprises
3.提供更多創業支援/資助 More entrepreneurship and financial support
4.採購本地IT產品及服務 Procurement of more local IT products and services
其他…
“IT專業化,承認本行業專業資格”
“法律與時並進,從而不會阻礙科技創意發展”
“帶頭除消外判制度, 直接聘用IT人才”
“推動本地IT技術開發及研究”
“吸引更多大型海外企業來港”
“對企業使用本地 IT 產品/服務作稅務豁免”
“推動各級學生學習程式語言”
“什麼都不要做!”
5大類
香港IT人
認為必備
求生技能
經驗– 了解商業需要、技術、應用科技改善流程
適應力– 求知欲、自我學習及與時並進
創意 – 解難能力
項目管理 – 專業態度、整合能力
人際關係 – 溝通、人脈
香港IT人具國際視野、語言能力優勢
創造需求從支持本地產品、服務開始
支持IT專業發展,提升行業水平
投資科技教育,培育未來新力軍
總結
謝謝
charlesmok@charlesmok.hk
Like on Facebook:
Charles Mok 莫乃光

More Related Content

Viewers also liked

Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...Kato Mivule
 
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...Trivadis
 
Information Security in Big Data : Privacy and Data Mining
Information Security in Big Data : Privacy and Data MiningInformation Security in Big Data : Privacy and Data Mining
Information Security in Big Data : Privacy and Data Miningwanani181
 
Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Peter Wood
 
Paper presentation held at national seminar
Paper presentation held at national seminarPaper presentation held at national seminar
Paper presentation held at national seminarKrishna Kumar
 
Information security in big data -privacy and data mining
Information security in big data -privacy and data miningInformation security in big data -privacy and data mining
Information security in big data -privacy and data miningharithavijay94
 
Conference Powerpoint Presentations
Conference Powerpoint PresentationsConference Powerpoint Presentations
Conference Powerpoint Presentationsapdh1312
 
The Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud ComputingThe Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud ComputingAnkit Singh
 
Review Paper – Power Point Presentation
Review Paper – Power Point PresentationReview Paper – Power Point Presentation
Review Paper – Power Point PresentationFerglapanter
 
Simultaneously Supporting Privacy and Auditing in Cloud Computing Systems
Simultaneously Supporting Privacy and Auditing in Cloud Computing SystemsSimultaneously Supporting Privacy and Auditing in Cloud Computing Systems
Simultaneously Supporting Privacy and Auditing in Cloud Computing SystemsTyrone Grandison
 
Global bigdata conf_01282013
Global bigdata conf_01282013Global bigdata conf_01282013
Global bigdata conf_01282013HPCC Systems
 

Viewers also liked (16)

Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
 
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...
 
Information Security in Big Data : Privacy and Data Mining
Information Security in Big Data : Privacy and Data MiningInformation Security in Big Data : Privacy and Data Mining
Information Security in Big Data : Privacy and Data Mining
 
Big data
Big dataBig data
Big data
 
Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)
 
Paper presentation held at national seminar
Paper presentation held at national seminarPaper presentation held at national seminar
Paper presentation held at national seminar
 
Information security in big data -privacy and data mining
Information security in big data -privacy and data miningInformation security in big data -privacy and data mining
Information security in big data -privacy and data mining
 
Big data security
Big data securityBig data security
Big data security
 
Conference Powerpoint Presentations
Conference Powerpoint PresentationsConference Powerpoint Presentations
Conference Powerpoint Presentations
 
The Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud ComputingThe Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud Computing
 
Review Paper – Power Point Presentation
Review Paper – Power Point PresentationReview Paper – Power Point Presentation
Review Paper – Power Point Presentation
 
Simultaneously Supporting Privacy and Auditing in Cloud Computing Systems
Simultaneously Supporting Privacy and Auditing in Cloud Computing SystemsSimultaneously Supporting Privacy and Auditing in Cloud Computing Systems
Simultaneously Supporting Privacy and Auditing in Cloud Computing Systems
 
IEEE Presentation
IEEE PresentationIEEE Presentation
IEEE Presentation
 
Ppt for national conference
Ppt for national conferencePpt for national conference
Ppt for national conference
 
Time Of Courage
Time Of CourageTime Of Courage
Time Of Courage
 
Global bigdata conf_01282013
Global bigdata conf_01282013Global bigdata conf_01282013
Global bigdata conf_01282013
 

Similar to 走出IT人才荒 研討會

雲端01_雲端服務家族的價值與經濟生態 林秋丹
雲端01_雲端服務家族的價值與經濟生態 林秋丹雲端01_雲端服務家族的價值與經濟生態 林秋丹
雲端01_雲端服務家族的價值與經濟生態 林秋丹Galaxy Software Services
 
四月新聞整理
四月新聞整理四月新聞整理
四月新聞整理ryoma1129
 
7.互联网安全人才发展现状
7.互联网安全人才发展现状7.互联网安全人才发展现状
7.互联网安全人才发展现状Hsiao Tim
 
猜你喜歡:虛實並進,贏在全通路
猜你喜歡:虛實並進,贏在全通路猜你喜歡:虛實並進,贏在全通路
猜你喜歡:虛實並進,贏在全通路Etu Solution
 
i聯網29:AIoT數位轉型Youtube演講第十二集-AIoT數位轉型是商業模式轉型
 i聯網29:AIoT數位轉型Youtube演講第十二集-AIoT數位轉型是商業模式轉型 i聯網29:AIoT數位轉型Youtube演講第十二集-AIoT數位轉型是商業模式轉型
i聯網29:AIoT數位轉型Youtube演講第十二集-AIoT數位轉型是商業模式轉型Richardpei AIOT 綠色數位轉型顧問
 
報一 科技辦簡報
報一 科技辦簡報報一 科技辦簡報
報一 科技辦簡報releaseey
 
行政院會 科技會報辦公室簡報:台灣AI行動計畫
行政院會 科技會報辦公室簡報:台灣AI行動計畫行政院會 科技會報辦公室簡報:台灣AI行動計畫
行政院會 科技會報辦公室簡報:台灣AI行動計畫releaseey
 
20180118行政院科技會報辦公室:「台灣ai行動計畫」報告(簡報)
20180118行政院科技會報辦公室:「台灣ai行動計畫」報告(簡報)20180118行政院科技會報辦公室:「台灣ai行動計畫」報告(簡報)
20180118行政院科技會報辦公室:「台灣ai行動計畫」報告(簡報)R.O.C.Executive Yuan
 
資訊服務產業趨勢
資訊服務產業趨勢資訊服務產業趨勢
資訊服務產業趨勢K H
 
mix taiwan臺中智慧城市論壇 吳騰彥總經理 -智慧城市之眼 用科技打造未來生活圈
mix taiwan臺中智慧城市論壇 吳騰彥總經理 -智慧城市之眼 用科技打造未來生活圈mix taiwan臺中智慧城市論壇 吳騰彥總經理 -智慧城市之眼 用科技打造未來生活圈
mix taiwan臺中智慧城市論壇 吳騰彥總經理 -智慧城市之眼 用科技打造未來生活圈Mix Taiwan
 
2008Industry Trend and Career Choice
2008Industry Trend and Career Choice2008Industry Trend and Career Choice
2008Industry Trend and Career Choicelnih
 
AOI智慧升級─AI訓練師在地養成計畫_台灣人工智慧學校
AOI智慧升級─AI訓練師在地養成計畫_台灣人工智慧學校AOI智慧升級─AI訓練師在地養成計畫_台灣人工智慧學校
AOI智慧升級─AI訓練師在地養成計畫_台灣人工智慧學校CHENHuiMei
 
迎戰未來製造用AIoT打造企業第二條成長曲線
迎戰未來製造用AIoT打造企業第二條成長曲線迎戰未來製造用AIoT打造企業第二條成長曲線
迎戰未來製造用AIoT打造企業第二條成長曲線Amazon Web Services
 
BOT-Taipei Cloud Park
BOT-Taipei Cloud ParkBOT-Taipei Cloud Park
BOT-Taipei Cloud ParkWayne Liang
 
大数据驱动在线用户行为分析与营销 20151210 v1.1(正式版)
大数据驱动在线用户行为分析与营销 20151210 v1.1(正式版)大数据驱动在线用户行为分析与营销 20151210 v1.1(正式版)
大数据驱动在线用户行为分析与营销 20151210 v1.1(正式版)Yu Zhang
 
[TOxAIA台中分校] AI 引爆新工業革命,智慧機械首都台中轉型論壇
[TOxAIA台中分校] AI 引爆新工業革命,智慧機械首都台中轉型論壇[TOxAIA台中分校] AI 引爆新工業革命,智慧機械首都台中轉型論壇
[TOxAIA台中分校] AI 引爆新工業革命,智慧機械首都台中轉型論壇台灣資料科學年會
 
職 場 現 形 記 (資料來源:104)
職 場 現 形 記 (資料來源:104)職 場 現 形 記 (資料來源:104)
職 場 現 形 記 (資料來源:104)ChiChi
 
20151112交通部:「創意臺灣ide@Taiwan 2020政策白皮書構面五智慧國土-智慧運輸」報告
20151112交通部:「創意臺灣ide@Taiwan 2020政策白皮書構面五智慧國土-智慧運輸」報告20151112交通部:「創意臺灣ide@Taiwan 2020政策白皮書構面五智慧國土-智慧運輸」報告
20151112交通部:「創意臺灣ide@Taiwan 2020政策白皮書構面五智慧國土-智慧運輸」報告R.O.C.Executive Yuan
 
報2 交通部 智慧運輸(o+m)
報2 交通部 智慧運輸(o+m)報2 交通部 智慧運輸(o+m)
報2 交通部 智慧運輸(o+m)releaseey
 
議題一02:引言簡報 蘇漢邦所長
議題一02:引言簡報 蘇漢邦所長議題一02:引言簡報 蘇漢邦所長
議題一02:引言簡報 蘇漢邦所長cisa-srb-2016
 

Similar to 走出IT人才荒 研討會 (20)

雲端01_雲端服務家族的價值與經濟生態 林秋丹
雲端01_雲端服務家族的價值與經濟生態 林秋丹雲端01_雲端服務家族的價值與經濟生態 林秋丹
雲端01_雲端服務家族的價值與經濟生態 林秋丹
 
四月新聞整理
四月新聞整理四月新聞整理
四月新聞整理
 
7.互联网安全人才发展现状
7.互联网安全人才发展现状7.互联网安全人才发展现状
7.互联网安全人才发展现状
 
猜你喜歡:虛實並進,贏在全通路
猜你喜歡:虛實並進,贏在全通路猜你喜歡:虛實並進,贏在全通路
猜你喜歡:虛實並進,贏在全通路
 
i聯網29:AIoT數位轉型Youtube演講第十二集-AIoT數位轉型是商業模式轉型
 i聯網29:AIoT數位轉型Youtube演講第十二集-AIoT數位轉型是商業模式轉型 i聯網29:AIoT數位轉型Youtube演講第十二集-AIoT數位轉型是商業模式轉型
i聯網29:AIoT數位轉型Youtube演講第十二集-AIoT數位轉型是商業模式轉型
 
報一 科技辦簡報
報一 科技辦簡報報一 科技辦簡報
報一 科技辦簡報
 
行政院會 科技會報辦公室簡報:台灣AI行動計畫
行政院會 科技會報辦公室簡報:台灣AI行動計畫行政院會 科技會報辦公室簡報:台灣AI行動計畫
行政院會 科技會報辦公室簡報:台灣AI行動計畫
 
20180118行政院科技會報辦公室:「台灣ai行動計畫」報告(簡報)
20180118行政院科技會報辦公室:「台灣ai行動計畫」報告(簡報)20180118行政院科技會報辦公室:「台灣ai行動計畫」報告(簡報)
20180118行政院科技會報辦公室:「台灣ai行動計畫」報告(簡報)
 
資訊服務產業趨勢
資訊服務產業趨勢資訊服務產業趨勢
資訊服務產業趨勢
 
mix taiwan臺中智慧城市論壇 吳騰彥總經理 -智慧城市之眼 用科技打造未來生活圈
mix taiwan臺中智慧城市論壇 吳騰彥總經理 -智慧城市之眼 用科技打造未來生活圈mix taiwan臺中智慧城市論壇 吳騰彥總經理 -智慧城市之眼 用科技打造未來生活圈
mix taiwan臺中智慧城市論壇 吳騰彥總經理 -智慧城市之眼 用科技打造未來生活圈
 
2008Industry Trend and Career Choice
2008Industry Trend and Career Choice2008Industry Trend and Career Choice
2008Industry Trend and Career Choice
 
AOI智慧升級─AI訓練師在地養成計畫_台灣人工智慧學校
AOI智慧升級─AI訓練師在地養成計畫_台灣人工智慧學校AOI智慧升級─AI訓練師在地養成計畫_台灣人工智慧學校
AOI智慧升級─AI訓練師在地養成計畫_台灣人工智慧學校
 
迎戰未來製造用AIoT打造企業第二條成長曲線
迎戰未來製造用AIoT打造企業第二條成長曲線迎戰未來製造用AIoT打造企業第二條成長曲線
迎戰未來製造用AIoT打造企業第二條成長曲線
 
BOT-Taipei Cloud Park
BOT-Taipei Cloud ParkBOT-Taipei Cloud Park
BOT-Taipei Cloud Park
 
大数据驱动在线用户行为分析与营销 20151210 v1.1(正式版)
大数据驱动在线用户行为分析与营销 20151210 v1.1(正式版)大数据驱动在线用户行为分析与营销 20151210 v1.1(正式版)
大数据驱动在线用户行为分析与营销 20151210 v1.1(正式版)
 
[TOxAIA台中分校] AI 引爆新工業革命,智慧機械首都台中轉型論壇
[TOxAIA台中分校] AI 引爆新工業革命,智慧機械首都台中轉型論壇[TOxAIA台中分校] AI 引爆新工業革命,智慧機械首都台中轉型論壇
[TOxAIA台中分校] AI 引爆新工業革命,智慧機械首都台中轉型論壇
 
職 場 現 形 記 (資料來源:104)
職 場 現 形 記 (資料來源:104)職 場 現 形 記 (資料來源:104)
職 場 現 形 記 (資料來源:104)
 
20151112交通部:「創意臺灣ide@Taiwan 2020政策白皮書構面五智慧國土-智慧運輸」報告
20151112交通部:「創意臺灣ide@Taiwan 2020政策白皮書構面五智慧國土-智慧運輸」報告20151112交通部:「創意臺灣ide@Taiwan 2020政策白皮書構面五智慧國土-智慧運輸」報告
20151112交通部:「創意臺灣ide@Taiwan 2020政策白皮書構面五智慧國土-智慧運輸」報告
 
報2 交通部 智慧運輸(o+m)
報2 交通部 智慧運輸(o+m)報2 交通部 智慧運輸(o+m)
報2 交通部 智慧運輸(o+m)
 
議題一02:引言簡報 蘇漢邦所長
議題一02:引言簡報 蘇漢邦所長議題一02:引言簡報 蘇漢邦所長
議題一02:引言簡報 蘇漢邦所長
 

More from Charles Mok

Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismCharles Mok
 
Threats to the Internet
Threats to the Internet Threats to the Internet
Threats to the Internet Charles Mok
 
Cyber Risks in Hong Kong
Cyber Risks in Hong KongCyber Risks in Hong Kong
Cyber Risks in Hong KongCharles Mok
 
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through CompulsionICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through CompulsionCharles Mok
 
全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇Charles Mok
 
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology FragmentationDigital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology FragmentationCharles Mok
 
HKU Tech for Good year2.pdf
HKU Tech for Good year2.pdfHKU Tech for Good year2.pdf
HKU Tech for Good year2.pdfCharles Mok
 
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for DemocracyTechnology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for DemocracyCharles Mok
 
APAC Data Center Infrastructure Observations
APAC Data Center Infrastructure ObservationsAPAC Data Center Infrastructure Observations
APAC Data Center Infrastructure ObservationsCharles Mok
 
Chinese Digital Repression
Chinese Digital RepressionChinese Digital Repression
Chinese Digital RepressionCharles Mok
 
Technology, Data and Ethics
Technology, Data and EthicsTechnology, Data and Ethics
Technology, Data and EthicsCharles Mok
 
全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇Charles Mok
 
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdfCharles Mok
 
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdfCensorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdfCharles Mok
 
HKU Tech for Good.pdf
HKU Tech for Good.pdfHKU Tech for Good.pdf
HKU Tech for Good.pdfCharles Mok
 
Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...Charles Mok
 
Misinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldMisinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldCharles Mok
 
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and TrendsFrom Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and TrendsCharles Mok
 
From Crypto to Trust and Identity
From Crypto to Trust and IdentityFrom Crypto to Trust and Identity
From Crypto to Trust and IdentityCharles Mok
 
Have you AI'ed today? A Reality Check
Have you AI'ed today? A Reality CheckHave you AI'ed today? A Reality Check
Have you AI'ed today? A Reality CheckCharles Mok
 

More from Charles Mok (20)

Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
 
Threats to the Internet
Threats to the Internet Threats to the Internet
Threats to the Internet
 
Cyber Risks in Hong Kong
Cyber Risks in Hong KongCyber Risks in Hong Kong
Cyber Risks in Hong Kong
 
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through CompulsionICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
 
全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇
 
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology FragmentationDigital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
 
HKU Tech for Good year2.pdf
HKU Tech for Good year2.pdfHKU Tech for Good year2.pdf
HKU Tech for Good year2.pdf
 
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for DemocracyTechnology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
 
APAC Data Center Infrastructure Observations
APAC Data Center Infrastructure ObservationsAPAC Data Center Infrastructure Observations
APAC Data Center Infrastructure Observations
 
Chinese Digital Repression
Chinese Digital RepressionChinese Digital Repression
Chinese Digital Repression
 
Technology, Data and Ethics
Technology, Data and EthicsTechnology, Data and Ethics
Technology, Data and Ethics
 
全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇
 
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
 
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdfCensorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
 
HKU Tech for Good.pdf
HKU Tech for Good.pdfHKU Tech for Good.pdf
HKU Tech for Good.pdf
 
Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...
 
Misinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldMisinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the World
 
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and TrendsFrom Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
 
From Crypto to Trust and Identity
From Crypto to Trust and IdentityFrom Crypto to Trust and Identity
From Crypto to Trust and Identity
 
Have you AI'ed today? A Reality Check
Have you AI'ed today? A Reality CheckHave you AI'ed today? A Reality Check
Have you AI'ed today? A Reality Check
 

走出IT人才荒 研討會