e-SIDES workshop at ICE-IEEE Conference, Madeira 28/06/2017e-SIDES.eu
On June 28, the e-SIDES team members made a presentation of the project at the ICE/IEEE Conference 2017 in Madeira. The workshop "Societal and Ethical Challenges in the Era of Big Data: Exploring the emerging issues and opportunities of big data management and analytic" welcomed a high-level international academic and government audience, such as professors and researchers, to present the initial analysis of the key challenges.
Values Interventions: Ethics Scholarship in ActionMichael Zimmer
iConference 2013 panel discussion on “Values Interventions: Ethics Scholarship in Action,” focusing on the Values-In-Design Council‘s work alongside the various NSF-funded projects exploring future Internet architectures. I
ICT and Environmental Regulation in the Developing World: Inequalities in Ins...Rónán Kennedy
SCRIPT Centre Workshop on 'ICT in a changing climate: ICT for environmental regulation as a global justice and development issue', University of Edinburgh, June 2015
ICTs for development: from e-Readiness to e-AwarenessIsmael Peña-López
Seminar given in Barcelona, November 20th, 2007 at the Executive Master in e-Governance, École Polytechnique Fédérale de Lausanne.
http://ictlogy.net/bibciter/reports/projects.php?idp=801
e-SIDES workshop at ICE-IEEE Conference, Madeira 28/06/2017e-SIDES.eu
On June 28, the e-SIDES team members made a presentation of the project at the ICE/IEEE Conference 2017 in Madeira. The workshop "Societal and Ethical Challenges in the Era of Big Data: Exploring the emerging issues and opportunities of big data management and analytic" welcomed a high-level international academic and government audience, such as professors and researchers, to present the initial analysis of the key challenges.
Values Interventions: Ethics Scholarship in ActionMichael Zimmer
iConference 2013 panel discussion on “Values Interventions: Ethics Scholarship in Action,” focusing on the Values-In-Design Council‘s work alongside the various NSF-funded projects exploring future Internet architectures. I
ICT and Environmental Regulation in the Developing World: Inequalities in Ins...Rónán Kennedy
SCRIPT Centre Workshop on 'ICT in a changing climate: ICT for environmental regulation as a global justice and development issue', University of Edinburgh, June 2015
ICTs for development: from e-Readiness to e-AwarenessIsmael Peña-López
Seminar given in Barcelona, November 20th, 2007 at the Executive Master in e-Governance, École Polytechnique Fédérale de Lausanne.
http://ictlogy.net/bibciter/reports/projects.php?idp=801
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018e-SIDES.eu
The following presentation was given at the workshop "Technology solutions for privacy issues: what is the best way forward?" organized by e-SIDES at the BDVe Meet-up in Sofia on May 14, 2018. The workshop, chaired by Gabriella Cattaneo from IDC, involved stakeholders from ICT-18 projects.
The seminar makes an approach to the concept of e-Readiness from the point of view of capacitation and digital literacy.
Different kinds or steps of digital literacy are presented and, then, the concept of e-Readiness is questioned, making it evolve towards the concept of e-Awareness.
Big Data can generate, through inferences, new knowledge and perspectives. The paradigm that results from using Big Data creates new opportunities. Big Data has great influence at the governmental level, positively affecting society. These systems can be made more efficient by applying transparency and open governance policies, such as Open Data. After developing predictive models for target audience behavior, Big Data can be used to generate early warnings for various situations. There is thus a positive feedback between research and practice, with rapid discoveries taken from practice.
DOI: 10.13140/RG.2.2.14677.17120
Use of Computational Tools to Support Planning & Policy by Johannes M. BauerLaleah Fernandez
Quello Center Director Johannes M. Bauer sharing his insights on the use of big data analytics and computational tools for policy design, implementation and monitoring at the 9th Annual Workshop on Survey Methodology, organized by NIC.br and ENCE, in São Paolo, Brazil, on May 21, 2019
AI Governance and Ethics - Industry StandardsAnsgar Koene
Presentation on the potential for Ethics based Industry Standards to function as vehicle to address socio-technical challenges from AI.
Presentation given at the the 1st Austrian IFIP forum ono "AI and future society".
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018e-SIDES.eu
The following presentation was given at the workshop "Technology solutions for privacy issues: what is the best way forward?" organized by e-SIDES at the BDVe Meet-up in Sofia on May 14, 2018. The workshop, chaired by Gabriella Cattaneo from IDC, involved stakeholders from ICT-18 projects.
The seminar makes an approach to the concept of e-Readiness from the point of view of capacitation and digital literacy.
Different kinds or steps of digital literacy are presented and, then, the concept of e-Readiness is questioned, making it evolve towards the concept of e-Awareness.
Big Data can generate, through inferences, new knowledge and perspectives. The paradigm that results from using Big Data creates new opportunities. Big Data has great influence at the governmental level, positively affecting society. These systems can be made more efficient by applying transparency and open governance policies, such as Open Data. After developing predictive models for target audience behavior, Big Data can be used to generate early warnings for various situations. There is thus a positive feedback between research and practice, with rapid discoveries taken from practice.
DOI: 10.13140/RG.2.2.14677.17120
Use of Computational Tools to Support Planning & Policy by Johannes M. BauerLaleah Fernandez
Quello Center Director Johannes M. Bauer sharing his insights on the use of big data analytics and computational tools for policy design, implementation and monitoring at the 9th Annual Workshop on Survey Methodology, organized by NIC.br and ENCE, in São Paolo, Brazil, on May 21, 2019
AI Governance and Ethics - Industry StandardsAnsgar Koene
Presentation on the potential for Ethics based Industry Standards to function as vehicle to address socio-technical challenges from AI.
Presentation given at the the 1st Austrian IFIP forum ono "AI and future society".
Views on Regulation and Governance issues in the Network of the Future - presentation given by Tapio Levä on behalf of the SAIL project at the 6th FP7 concertation meeting.
e-SIDES workshop at ICT 2018, Vienna 5/12/2018e-SIDES.eu
The following presentation was given at the workshop "Building the Privacy and Security Research Agenda for Big Data" organized by e-SIDES at ICT 2018 in Vienna on December 5, 2018. The workshop, chaired by Richard Stevens (IDC and e-SIDES), included a panel discussion with:
Natalie Bertels - Research Unit KU Leuven Centre for IT & IP Law KU Leuven; Tjerk Timan – Policy Analyst TNO; Anna Zsófia Horváth - Department of Corporate Law, Civil Law – Internet Law, Copyright and Telecommuncation Law University of Goettingen; Dr Vlado Stankovski - Distributed and Cloud Computing University of Ljubljana.
Computer Forensics
Discussion 1
"Forensics Certifications" Please respond to the following:
· Determine whether or not you believe certifications in systems forensics are necessary and explain why you believe this to be the case. Compare and contrast certifications and on-the-job training and identify which you believe is more useful for a system forensics professional. Provide a rationale with your response.
· Suppose you are the hiring manager looking to hire a new system forensics specialist. Specify at least five (5) credentials you would expect an ample candidate to possess. Determine which of these credentials you believe to be the most important and provide a reason for your decision.
Discussion 2
"System Forensics Organizations" Please respond to the following:
· Use the Internet or the Library to research and select one (1) reputable system forensics organization. Provide a brief overview of the organization you chose, including what it provides for its members, and how one can join the organization. Indicate why, in your opinion, this particular organization would be the best choice for a system forensics professional to join and why you believe this way.
· Examine what you believe to be the most important reason for a systems forensic professional to be a member of a forensics organization and how this could further one’s career in the industry.
Cyber Security
Discussion 1
"Leading Through Effective Strategic Management" Please respond to the following:
· Propose three ways to ensure that cooperation occurs across security functions when developing a strategic plan. Select what you believe is the most effective way to promote collaboration and explain why.
· Explain what may happen if working cultures are overlooked when developing a strategy. Recommend one way to prevent working cultures from being overlooked.
Discussion 2
"Installing Security with System and Application Development" Please respond to the following:
· Provide three examples that demonstrate how security can be instilled within the Systems Development Life Cycle (SDLC). Provide two examples on what users may experience with software products if they are released with minimal security planning.
· Suggest three ways that application security can be monitored and evaluated for effectiveness. Choose what you believe to be the most effective way and discuss why.
Computer Security
Discussion 1
"Current Events and Future Trends" Please respond to the following:
· How can we create a national security culture where all are more cognizant of security threats and involved to help prevent potential incidents? How do we balance the need for this security culture with the rights guaranteed to us by our Bill of Rights?
Research Topics (Choose 1 Topic)
Terrorism
· Terrorism remains one of the major concerns in the wake of the 9-11 events. Research into terrorism as it pertains to homeland security is conducted by corporations like the RAND Corporation, which is.
In this presentation, I highlighted the significance of adopting development methods for the successful development of IoT-based systems. By adopting systematic development methods, we can ensure that IoT systems are built with a structured approach, minimizing risks and enhancing overall reliability. I discussed the benefits of utilizing development methods, such as improved project management, streamlined development processes, and the ability to consistently deliver high-quality IoT solutions.
Re thinking regulation at the age of AILofred Madzou
This is a presentation of the keynote that Lofred Madzou (AI Project Lead at the World Economic Forum) gave on October 14th at the Instituto Nacional de Defensa de la Competencia y la Propiedad Intelectual (INDECOPI) in Lima. It presents some of the most important policy challenges associated with the development of means to address them.
Global Tech Security Commission Overview Keith Krach
Global Tech Security Commission Overview
Mission
Develop the definitive global tech security strategy to safeguard freedom through the adoption of trusted technology by designing a set of sector specific strategies as well as an integrated approach that democracies can adopt to counter techno-authoritarianism.
Objective
The core objective of the Commission is to assemble a network of global multi-sector leaders to create a global tech security strategy to safeguard freedom through the adoption of trusted technology. The Commission will publish a groundbreaking report that serves as the preeminent policy playbook for global tech security that rallies and unifies countries, companies, and civil society and results in a global trust network that safeguards freedom.
The final Commission report will articulate a common strategic vision for the future of technology and its relationship to liberal democratic principles among like-minded states and actors. The report will offer concrete steps for democratic countries to collectively develop and promote technological advances that bolster democratic governance and individual rights, thereby outflanking rather than reacting to China’s future techno-authoritarian efforts.
Goals
1. Design a set of sector specific strategies in 12 technology industry verticals and recommend a set of policy actions for the U.S. and like-minded nations to proactively counter threats posed authoritarian regimes.
2. Integrate a comprehensive set of industry strategies designed to advance global economic security by expanding technological collaboration between allies.
3. Build a unified global network of companies, institutions, industry leaders, and countries, committed to trust standards and principles.
4. Establish a meaningful set of trust standards to create a level playing field, and end abuse by authoritarian regimes.
5. Catalyze the widespread adoption of trusted technologies to advance freedom
Similar to Review of Previous ETAP Forums - Deepak Maheshwari (20)
Homomorphic Lower Digit Removal and Improved FHE Bootstrapping by Kyoohyung Hanvpnmentor
Kyoohyung Han is a PhD student in the Department of Mathematical Science at the Seoul National University in Korea. These are the slides from his presentation at EuroCrypt 2018.
Michael schapira - Hebrew University Jeruslaem - Secure Internet Routingvpnmentor
Cyberspace is comprised of all existing computers and devices communicating over computer networks. This makes network security a key ingredient of cybersecurity, and a highly important topic, both with respect to research and to understanding industry best practices. The Bar-Ilan Center for Applied Cryptography and Cyber Security is therefore hosting a Focus Day on Network Security, where we will discuss both academic and practical aspects of the field, including an overview of some of the practical network security issues faced by operators and cybersecurity firms.
A research-oriented introduction to the cryptographic currencies (starting wi...vpnmentor
Presentation by Stefan Dziembowski, associate professor and leader of Cryptology and Data Security Group University of Warsaw. In BIU workshop on Bitcoin. Covered exclusively by vpnMentor.com
Presentation by Stefan Dziembowski, associate professor and leader of Cryptology and Data Security Group University of Warsaw. In BIU workshop on Bitcoin. Covered exclusively by vpnMentor.com
Presentation by Stefan Dziembowski, associate professor and leader of Cryptology and Data Security Group University of Warsaw. In BIU workshop on Bitcoin. Covered exclusively by vpnMentor.com
Presentation by Stefan Dziembowski, associate professor and leader of Cryptology and Data Security Group University of Warsaw. In BIU workshop on Bitcoin. Covered exclusively by vpnMentor.com
Presentation by Stefan Dziembowski, associate professor and leader of Cryptology and Data Security Group University of Warsaw. In BIU workshop on Bitcoin. Covered exclusively by vpnMentor.com
Presentation by Stefan Dziembowski, associate professor and leader of Cryptology and Data Security Group University of Warsaw. In BIU workshop on Bitcoin. Covered exclusively by vpnMentor.com
0-RTT, Resumption and Delayed Authentication
2 May 2016
Cas Cremers
Marko Horvat
Sam Scott
Thyla van der Merwe
Presented at cyber TLS day at BIU. Sponsored by vpnMentor.com
On the Security of TLS-DHE in the Standard Modelvpnmentor
Tibor Jager, Florian Kohlar, Sven Schäge, and Jörg Schwenk
Horst Görtz Ins,tute for IT Security, Bochum
1st BIU Security Day: The Current Status of TLS Security
May 1, 2016
Bar-Ilan University, Israel
Sponsored by vpnMentor.com
On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryptionvpnmentor
Tibor Jager, Jörg Schwenk, Juraj Somorovsky
Horst Görtz InsFtute for IT Security
Ruhr-University Bochum
1st BIU Security Day: The Current Status of TLS Security
May 1, 2016
Bar-Ilan University, Israel - Sponsored by vpnMentor.com
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
Understanding User Behavior with Google Analytics.pdfSEO Article Boost
Unlocking the full potential of Google Analytics is crucial for understanding and optimizing your website’s performance. This guide dives deep into the essential aspects of Google Analytics, from analyzing traffic sources to understanding user demographics and tracking user engagement.
Traffic Sources Analysis:
Discover where your website traffic originates. By examining the Acquisition section, you can identify whether visitors come from organic search, paid campaigns, direct visits, social media, or referral links. This knowledge helps in refining marketing strategies and optimizing resource allocation.
User Demographics Insights:
Gain a comprehensive view of your audience by exploring demographic data in the Audience section. Understand age, gender, and interests to tailor your marketing strategies effectively. Leverage this information to create personalized content and improve user engagement and conversion rates.
Tracking User Engagement:
Learn how to measure user interaction with your site through key metrics like bounce rate, average session duration, and pages per session. Enhance user experience by analyzing engagement metrics and implementing strategies to keep visitors engaged.
Conversion Rate Optimization:
Understand the importance of conversion rates and how to track them using Google Analytics. Set up Goals, analyze conversion funnels, segment your audience, and employ A/B testing to optimize your website for higher conversions. Utilize ecommerce tracking and multi-channel funnels for a detailed view of your sales performance and marketing channel contributions.
Custom Reports and Dashboards:
Create custom reports and dashboards to visualize and interpret data relevant to your business goals. Use advanced filters, segments, and visualization options to gain deeper insights. Incorporate custom dimensions and metrics for tailored data analysis. Integrate external data sources to enrich your analytics and make well-informed decisions.
This guide is designed to help you harness the power of Google Analytics for making data-driven decisions that enhance website performance and achieve your digital marketing objectives. Whether you are looking to improve SEO, refine your social media strategy, or boost conversion rates, understanding and utilizing Google Analytics is essential for your success.
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...JeyaPerumal1
A cellular network, frequently referred to as a mobile network, is a type of communication system that enables wireless communication between mobile devices. The final stage of connectivity is achieved by segmenting the comprehensive service area into several compact zones, each called a cell.
Italy Agriculture Equipment Market Outlook to 2027harveenkaur52
Agriculture and Animal Care
Ken Research has an expertise in Agriculture and Animal Care sector and offer vast collection of information related to all major aspects such as Agriculture equipment, Crop Protection, Seed, Agriculture Chemical, Fertilizers, Protected Cultivators, Palm Oil, Hybrid Seed, Animal Feed additives and many more.
Our continuous study and findings in agriculture sector provide better insights to companies dealing with related product and services, government and agriculture associations, researchers and students to well understand the present and expected scenario.
Our Animal care category provides solutions on Animal Healthcare and related products and services, including, animal feed additives, vaccination
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfFlorence Consulting
Quattordicesimo Meetup di Milano, tenutosi a Milano il 23 Maggio 2024 dalle ore 17:00 alle ore 18:30 in presenza e da remoto.
Abbiamo parlato di come Axpo Italia S.p.A. ha ridotto il technical debt migrando le proprie APIs da Mule 3.9 a Mule 4.4 passando anche da on-premises a CloudHub 1.0.
Review of Previous ETAP Forums - Deepak Maheshwari
1. Review of Previous ETAP Forums
22 June 2016 – Tel Aviv, Israel
Deepak Maheshwari
1
2. IEEE Internet Initiative (3I):
Connecting the Global Technology & Policy Making Communities
on Internet Governance, Cybersecurity, and Privacy
The IEEE Internet Initiative connects the technology and policy
making communities, both at a global and local level, in order to:
– Inform debate and decisions
– Ensure trustworthy technology solutions and best practices
The IEEE Internet Initiative facilitates the engagement of
technology, industry and policy experts in a neutral environment
for the collective benefit of all stakeholders
Technology
Experts
Policy
Makers
IEEE
Internet
Initiative
2
3. IEEE Experts in Technology and
Policy (ETAP) Forums
The ETAP Forums are a series of events that bring together
technology developers and policy makers to debate current
and future Internet technology policy issues that impact
everyone on a global, national, and local level
“Local conversations on a global scale”
Five previous ETAP Forums:
– San Jose, USA, May 2015
– Tel Aviv, Israel, August 2015
– Washington DC, USA, February 2016
– Delhi, India, March 2016
– Beijing, China, May 2016
3
4. General ETAP Agenda Structure
Introduction
Keynote presentations
Rapid-fire round for everyone to introduce their most
important issue
Panel discussion
Ranking and selection of top rapid-fire issues for
breakout discussions
Breakout sessions
Breakout summaries
Actions and wrap up
4
5. ETAP Forum San Jose, USA
May 2015
Inaugural ETAP Forum
Goal: Identify key
issues to be addressed,
and build kernel of
expert community for
follow-on work
40 participants from 5
regions: China, India,
Africa, Europe, North
America
5
6. San Jose: Top 6 of 20 Identified
Issues
1. Threats and opportunities in data analytics
2. Multi‐stakeholder Internet governance
3. Protecting Internet traffic, managing meta‐data analysis,
and how to implement both security and privacy at scale
4. Fragmentation of the Internet due to local policies and how
to avoid it
5. Algorithmic decision making that exacerbates existing
power balances and ethical concerns
6. How to best engage IEEE as a platform for contributing to
the resolution of these and related issues
6
7. San Jose: Proposed Actions
Conduct additional ETAP Forums around the
world, to collate diversity of regional views
Future ETAP Forums should focus on and
refine the six top issues identified, with the
goal of moving several to a format for
action
Open nature of ETAP Forums should allow
regional participants to introduce priority
issues of their own
7
8. ETAP Forum Tel Aviv, Israel
August 2015
30 participants from 4
regions: Middle East,
India, Europe, North
America
Many participants were
local, but included
representation from
government, industry,
law, academia
8
9. Tel Aviv 2015: Top 3 of 13
Identified Issues
1.User assessment of trustworthiness of
devices, enterprises and governments
2.Educating users about characteristics of
information society
3.Machine-readable privacy agreements and
who enforces them
9
10. Tel Aviv 2015: Proposed Actions
Prepare a draft proposal for a standard for
machine-readable privacy agreements
Develop educational material such as games
and icons that encourage safe and ethical
online behavior
Consider certification of developers for privacy
and security best practices and certification of
websites and applications for privacy and
security
Plan future ETAP Forums in Israel and India in
2016
10
11. ETAP Forum Washington DC, USA
February 2016
50 participants from 4
regions: Russia, Japan,
India, North America
Many participants were
local, including
representation from
government, industry,
law, academia
11
12. Washington DC: Top 4 of 39
Identified Issues
1.Data localization
2.Education and ethics
3.End-to-end security/privacy by design
4.Technology-policy development process
12
13. Washington DC: Proposed Actions
Create tips and tools and/or host events to alleviate tension across
technical and regulatory communities and policy makers of different
jurisdictions
Identify fundamental policy principles that are being called into
question by the proliferation of the IoT (e.g., right to opt in/out)
Strive to create a layered model (similar to OSI network model) to
guide policy for end-to-end security and privacy by design
For data localization, develop case studies (e.g., house monitoring,
medical devices that travel with users, efficient routing, etc.), gather
economic analyses, perform technical analyses, and explore
certification for data practices
Develop content and programs for education and ethics around IoT,
identify partner channels for creation and distribution of the content,
and determine performance indicators
Continue the conversation on-line, to elaborate on the issues voiced
during the rapid-fire brainstorming, and to develop and execute action
plans for the above identified opportunities
13
14. First ETAP in a developing country
Overarching theme "Universal
Access for Social and Economic
Inclusion - Technology and
Policy Considerations" with
specific emphasis on:
– Security and Privacy in
Biometrics
– Emerging Technologies for
the Last Mile Access
40 participants from India, North
America, Middle East, and beyond
Many participants were local,
including representation from
government, industry, law,
academia
ETAP Forum Delhi, India
March 2016
14
15. Delhi: Top 2 Issues
1.Protecting Internet traffic, managing
meta-data analysis, and how to
implement both security and privacy at
scale
2.Options and challenges in providing
universal access for social and economic
inclusion
15
16. Delhi: Proposed Actions
Development of a white paper on the policy
and technology implications of protecting
Internet traffic
Clarify and refine the scope of a white paper
to be written on the options and challenges
in providing universal access
16
17. Technical Co-Sponsor: China
Internet Network Information
Center (CNNIC)
Topic: Closing the Cyberspace
Policy-Technology Divide to Drive
the Future of the Internet
Focus Areas:
– Assessing technology and policy
factors and actors that affect the
development and management of the
Internet
– Global acceptance of technology
protocols and standards versus policy
localization
– Building an environment that enables
the interaction of technologists and
policy makers
60 participants, including
representation from government,
industry, law, academia
ETAP Forum Beijing, China
May 2016
17
18. Beijing: Top 3 of 18 Identified
Issues
Cyber-threats to critical infrastructure,
including eGovernment/eCommerce
Biodiversity in the Internet ecosystem
Transparency as a source for obtaining
data for evidence-based decision making
18
19. Beijing: Proposed Actions
Create threat intelligence standards that define threat
terminology, categorize the various types of threats,
and create methodologies for sharing information
about threats
Create a platform to allow researchers, industry, and
authorities to carry out a range of important tasks in
combating cyber-threats to critical infrastructure
Create a standardized benchmark for transparency
that could address questions such as how to measure
and track transparency over time
Policymakers and technologists can play a role as
conscientious “gardeners” to ensure diversity,
resilience, and sustainability of the Internet ecology
19
20. Summary of Top Identified Issues
in Internet Technology Policy
Threats and opportunities in data analytics
Algorithmic decision making that exacerbates existing power balances and ethical
concerns
Multi-stakeholder Internet governance
Technology-policy development process
Protecting Internet traffic, managing meta-data analysis, and how to implement
both security and privacy at scale
End-to-end security and privacy by design
Fragmentation of the Internet, and data localization due to local policies
User assessment of trustworthiness of devices, enterprises and governments
Machine-readable privacy agreements, and who enforces them
Educating users about characteristics of information society and ethics
Options and challenges in providing universal access for social and economic
inclusion
20
22. Whitepapers and Research
Standard for Machine readable privacy agreements, lead by Ori
Freiman, Jonathan Klinger
Protecting Internet traffic (encrypted by default), led by Prasad
Mantri, Dr Dattareya Kulkarni and Rahul Sharma.
Options and challenges in providing universal access, lead by Prasad
Mantri, Subrat Kumar Prusty
End to end trust and security in IoT, lead by Peter Fonash, Brian Done
(DHS), Chris Hrivnak and Alan Chachich
Algorithmic decision making
Threats and opportunities in data analytics (Standard to anonymize
data).
22
23. Get Involved: ITP Community
23
Start new discussions in the Collabratec™ ITP community by posting
relevant issues and asking questions
Open your own private group in Collabratec™ then invite others to research
and co-author with you around specific topics
Participate in and help organize regional Experts in Technology and Policy
(ETAP) events; then lead follow-up activities around the resulting outputs
and takeaways
Participate in IEEE Internet Initiative webinars and other online panel
discussions
http://internetinitiative.ieee.org
Editor's Notes
The IEEE Internet Initiative connects the technical community to global policymaking for Internet governance, cybersecurity and privacy—to inform debate and decisions, and to help ensure trustworthy technology solutions and best practices.
Through the initiative, IEEE is connecting engineers, scientists, industry leaders and others engaged in an array of technology and industry domains globally, with policy experts, in a neutral environment for the collective benefit of all stakeholders. Not only does the IEEE Internet Initiative help improve the state of knowledge about technology and its implications and impact on Internet governance issues, it also raises awareness of public policy issues and processes in the global technical community.