SlideShare a Scribd company logo
Review of Previous ETAP Forums
22 June 2016 – Tel Aviv, Israel
Deepak Maheshwari
1
IEEE Internet Initiative (3I):
Connecting the Global Technology & Policy Making Communities
on Internet Governance, Cybersecurity, and Privacy
The IEEE Internet Initiative connects the technology and policy
making communities, both at a global and local level, in order to:
– Inform debate and decisions
– Ensure trustworthy technology solutions and best practices
The IEEE Internet Initiative facilitates the engagement of
technology, industry and policy experts in a neutral environment
for the collective benefit of all stakeholders
Technology
Experts
Policy
Makers
IEEE
Internet
Initiative
2
IEEE Experts in Technology and
Policy (ETAP) Forums
The ETAP Forums are a series of events that bring together
technology developers and policy makers to debate current
and future Internet technology policy issues that impact
everyone on a global, national, and local level
“Local conversations on a global scale”
Five previous ETAP Forums:
– San Jose, USA, May 2015
– Tel Aviv, Israel, August 2015
– Washington DC, USA, February 2016
– Delhi, India, March 2016
– Beijing, China, May 2016
3
General ETAP Agenda Structure
Introduction
Keynote presentations
Rapid-fire round for everyone to introduce their most
important issue
Panel discussion
Ranking and selection of top rapid-fire issues for
breakout discussions
Breakout sessions
Breakout summaries
Actions and wrap up
4
ETAP Forum San Jose, USA
May 2015
Inaugural ETAP Forum
Goal: Identify key
issues to be addressed,
and build kernel of
expert community for
follow-on work
40 participants from 5
regions: China, India,
Africa, Europe, North
America
5
San Jose: Top 6 of 20 Identified
Issues
1. Threats and opportunities in data analytics
2. Multi‐stakeholder Internet governance
3. Protecting Internet traffic, managing meta‐data analysis,
and how to implement both security and privacy at scale
4. Fragmentation of the Internet due to local policies and how
to avoid it
5. Algorithmic decision making that exacerbates existing
power balances and ethical concerns
6. How to best engage IEEE as a platform for contributing to
the resolution of these and related issues
6
San Jose: Proposed Actions
Conduct additional ETAP Forums around the
world, to collate diversity of regional views
Future ETAP Forums should focus on and
refine the six top issues identified, with the
goal of moving several to a format for
action
Open nature of ETAP Forums should allow
regional participants to introduce priority
issues of their own
7
ETAP Forum Tel Aviv, Israel
August 2015
30 participants from 4
regions: Middle East,
India, Europe, North
America
Many participants were
local, but included
representation from
government, industry,
law, academia
8
Tel Aviv 2015: Top 3 of 13
Identified Issues
1.User assessment of trustworthiness of
devices, enterprises and governments
2.Educating users about characteristics of
information society
3.Machine-readable privacy agreements and
who enforces them
9
Tel Aviv 2015: Proposed Actions
Prepare a draft proposal for a standard for
machine-readable privacy agreements
Develop educational material such as games
and icons that encourage safe and ethical
online behavior
Consider certification of developers for privacy
and security best practices and certification of
websites and applications for privacy and
security
Plan future ETAP Forums in Israel and India in
2016
10
ETAP Forum Washington DC, USA
February 2016
50 participants from 4
regions: Russia, Japan,
India, North America
Many participants were
local, including
representation from
government, industry,
law, academia
11
Washington DC: Top 4 of 39
Identified Issues
1.Data localization
2.Education and ethics
3.End-to-end security/privacy by design
4.Technology-policy development process
12
Washington DC: Proposed Actions
Create tips and tools and/or host events to alleviate tension across
technical and regulatory communities and policy makers of different
jurisdictions
Identify fundamental policy principles that are being called into
question by the proliferation of the IoT (e.g., right to opt in/out)
Strive to create a layered model (similar to OSI network model) to
guide policy for end-to-end security and privacy by design
For data localization, develop case studies (e.g., house monitoring,
medical devices that travel with users, efficient routing, etc.), gather
economic analyses, perform technical analyses, and explore
certification for data practices
Develop content and programs for education and ethics around IoT,
identify partner channels for creation and distribution of the content,
and determine performance indicators
Continue the conversation on-line, to elaborate on the issues voiced
during the rapid-fire brainstorming, and to develop and execute action
plans for the above identified opportunities
13
First ETAP in a developing country
Overarching theme "Universal
Access for Social and Economic
Inclusion - Technology and
Policy Considerations" with
specific emphasis on:
– Security and Privacy in
Biometrics
– Emerging Technologies for
the Last Mile Access
40 participants from India, North
America, Middle East, and beyond
Many participants were local,
including representation from
government, industry, law,
academia
ETAP Forum Delhi, India
March 2016
14
Delhi: Top 2 Issues
1.Protecting Internet traffic, managing
meta-data analysis, and how to
implement both security and privacy at
scale
2.Options and challenges in providing
universal access for social and economic
inclusion
15
Delhi: Proposed Actions
Development of a white paper on the policy
and technology implications of protecting
Internet traffic
Clarify and refine the scope of a white paper
to be written on the options and challenges
in providing universal access
16
Technical Co-Sponsor: China
Internet Network Information
Center (CNNIC)
Topic: Closing the Cyberspace
Policy-Technology Divide to Drive
the Future of the Internet
Focus Areas:
– Assessing technology and policy
factors and actors that affect the
development and management of the
Internet
– Global acceptance of technology
protocols and standards versus policy
localization
– Building an environment that enables
the interaction of technologists and
policy makers
60 participants, including
representation from government,
industry, law, academia
ETAP Forum Beijing, China
May 2016
17
Beijing: Top 3 of 18 Identified
Issues
Cyber-threats to critical infrastructure,
including eGovernment/eCommerce
Biodiversity in the Internet ecosystem
Transparency as a source for obtaining
data for evidence-based decision making
18
Beijing: Proposed Actions
Create threat intelligence standards that define threat
terminology, categorize the various types of threats,
and create methodologies for sharing information
about threats
Create a platform to allow researchers, industry, and
authorities to carry out a range of important tasks in
combating cyber-threats to critical infrastructure
Create a standardized benchmark for transparency
that could address questions such as how to measure
and track transparency over time
Policymakers and technologists can play a role as
conscientious “gardeners” to ensure diversity,
resilience, and sustainability of the Internet ecology
19
Summary of Top Identified Issues
in Internet Technology Policy
Threats and opportunities in data analytics
Algorithmic decision making that exacerbates existing power balances and ethical
concerns
Multi-stakeholder Internet governance
Technology-policy development process
Protecting Internet traffic, managing meta-data analysis, and how to implement
both security and privacy at scale
End-to-end security and privacy by design
Fragmentation of the Internet, and data localization due to local policies
User assessment of trustworthiness of devices, enterprises and governments
Machine-readable privacy agreements, and who enforces them
Educating users about characteristics of information society and ethics
Options and challenges in providing universal access for social and economic
inclusion
20
Internet Technology Policy Community
21
Whitepapers and Research
Standard for Machine readable privacy agreements, lead by Ori
Freiman, Jonathan Klinger
Protecting Internet traffic (encrypted by default), led by Prasad
Mantri, Dr Dattareya Kulkarni and Rahul Sharma.
Options and challenges in providing universal access, lead by Prasad
Mantri, Subrat Kumar Prusty
End to end trust and security in IoT, lead by Peter Fonash, Brian Done
(DHS), Chris Hrivnak and Alan Chachich
Algorithmic decision making
Threats and opportunities in data analytics (Standard to anonymize
data).
22
Get Involved: ITP Community
23
Start new discussions in the Collabratec™ ITP community by posting
relevant issues and asking questions
Open your own private group in Collabratec™ then invite others to research
and co-author with you around specific topics
Participate in and help organize regional Experts in Technology and Policy
(ETAP) events; then lead follow-up activities around the resulting outputs
and takeaways
Participate in IEEE Internet Initiative webinars and other online panel
discussions
http://internetinitiative.ieee.org

More Related Content

What's hot

AI and Legal Tech in Context: Privacy and Security Commons
AI and Legal Tech in Context: Privacy and Security CommonsAI and Legal Tech in Context: Privacy and Security Commons
AI and Legal Tech in Context: Privacy and Security Commons
professormadison
 
Deliberation In The Internet
Deliberation In The InternetDeliberation In The Internet
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018
e-SIDES.eu
 
From e-Readiness to e-Awareness (or the way back)
From e-Readiness to e-Awareness (or the way back)From e-Readiness to e-Awareness (or the way back)
From e-Readiness to e-Awareness (or the way back)
Ismael Peña-López
 
Philosophical Aspects of Big Data
Philosophical Aspects of Big DataPhilosophical Aspects of Big Data
Philosophical Aspects of Big Data
Nicolae Sfetcu
 
PPIT Lecture 7
PPIT Lecture 7PPIT Lecture 7
PPIT Lecture 7
Kashif Sohail
 
CTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard SimpsonCTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard Simpsonsegughana
 
Use of Computational Tools to Support Planning & Policy by Johannes M. Bauer
Use of Computational Tools to Support Planning & Policy by Johannes M. BauerUse of Computational Tools to Support Planning & Policy by Johannes M. Bauer
Use of Computational Tools to Support Planning & Policy by Johannes M. Bauer
Laleah Fernandez
 
Akolade data presentation by Paul O'Connor
Akolade data presentation by Paul O'ConnorAkolade data presentation by Paul O'Connor
Akolade data presentation by Paul O'ConnorPaul O'Connor
 
Regulation and the Internet of Things
Regulation and the Internet of ThingsRegulation and the Internet of Things
Regulation and the Internet of Things
blogzilla
 
Wikileaks freedom of speech on the internet
Wikileaks freedom of speech on the internetWikileaks freedom of speech on the internet
Wikileaks freedom of speech on the internetVincy
 
PPIT Lecture 10
PPIT Lecture 10PPIT Lecture 10
PPIT Lecture 10
Kashif Sohail
 
Social media impact on freedom of expression and privacy
Social media impact on freedom of expression and privacySocial media impact on freedom of expression and privacy
Social media impact on freedom of expression and privacy
Yasmin AbdelAziz
 
CTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha FernandoCTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha Fernandosegughana
 
3 censorship privacy
3 censorship privacy3 censorship privacy
3 censorship privacy
tolshinoda
 
A Collaborative, Decentralized Internet Governance Ecosystem
A Collaborative, Decentralized Internet Governance EcosystemA Collaborative, Decentralized Internet Governance Ecosystem
A Collaborative, Decentralized Internet Governance Ecosystem
Andile Ngcaba
 
AI Governance and Ethics - Industry Standards
AI Governance and Ethics - Industry StandardsAI Governance and Ethics - Industry Standards
AI Governance and Ethics - Industry Standards
Ansgar Koene
 
Big Data Socio-Economic Externalities – the BYTE Case Studies
Big Data Socio-Economic Externalities – the BYTE Case StudiesBig Data Socio-Economic Externalities – the BYTE Case Studies
Big Data Socio-Economic Externalities – the BYTE Case Studies
BYTE Project
 

What's hot (20)

AI and Legal Tech in Context: Privacy and Security Commons
AI and Legal Tech in Context: Privacy and Security CommonsAI and Legal Tech in Context: Privacy and Security Commons
AI and Legal Tech in Context: Privacy and Security Commons
 
Deliberation In The Internet
Deliberation In The InternetDeliberation In The Internet
Deliberation In The Internet
 
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018
 
Session 3 Results
Session 3 ResultsSession 3 Results
Session 3 Results
 
From e-Readiness to e-Awareness (or the way back)
From e-Readiness to e-Awareness (or the way back)From e-Readiness to e-Awareness (or the way back)
From e-Readiness to e-Awareness (or the way back)
 
Philosophical Aspects of Big Data
Philosophical Aspects of Big DataPhilosophical Aspects of Big Data
Philosophical Aspects of Big Data
 
PPIT Lecture 7
PPIT Lecture 7PPIT Lecture 7
PPIT Lecture 7
 
CTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard SimpsonCTO-CybersecurityForum-2010-Richard Simpson
CTO-CybersecurityForum-2010-Richard Simpson
 
Use of Computational Tools to Support Planning & Policy by Johannes M. Bauer
Use of Computational Tools to Support Planning & Policy by Johannes M. BauerUse of Computational Tools to Support Planning & Policy by Johannes M. Bauer
Use of Computational Tools to Support Planning & Policy by Johannes M. Bauer
 
Akolade data presentation by Paul O'Connor
Akolade data presentation by Paul O'ConnorAkolade data presentation by Paul O'Connor
Akolade data presentation by Paul O'Connor
 
Regulation and the Internet of Things
Regulation and the Internet of ThingsRegulation and the Internet of Things
Regulation and the Internet of Things
 
Wikileaks freedom of speech on the internet
Wikileaks freedom of speech on the internetWikileaks freedom of speech on the internet
Wikileaks freedom of speech on the internet
 
PPIT Lecture 10
PPIT Lecture 10PPIT Lecture 10
PPIT Lecture 10
 
Social media impact on freedom of expression and privacy
Social media impact on freedom of expression and privacySocial media impact on freedom of expression and privacy
Social media impact on freedom of expression and privacy
 
CTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha FernandoCTO-CybersecurityForum-2010-Jayantha Fernando
CTO-CybersecurityForum-2010-Jayantha Fernando
 
V5I6-0559
V5I6-0559V5I6-0559
V5I6-0559
 
3 censorship privacy
3 censorship privacy3 censorship privacy
3 censorship privacy
 
A Collaborative, Decentralized Internet Governance Ecosystem
A Collaborative, Decentralized Internet Governance EcosystemA Collaborative, Decentralized Internet Governance Ecosystem
A Collaborative, Decentralized Internet Governance Ecosystem
 
AI Governance and Ethics - Industry Standards
AI Governance and Ethics - Industry StandardsAI Governance and Ethics - Industry Standards
AI Governance and Ethics - Industry Standards
 
Big Data Socio-Economic Externalities – the BYTE Case Studies
Big Data Socio-Economic Externalities – the BYTE Case StudiesBig Data Socio-Economic Externalities – the BYTE Case Studies
Big Data Socio-Economic Externalities – the BYTE Case Studies
 

Similar to Review of Previous ETAP Forums - Deepak Maheshwari

Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Great Wide Open
 
Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...
Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...
Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...
Ansgar Koene
 
Sail regulation governance 101018
Sail regulation governance 101018Sail regulation governance 101018
Sail regulation governance 101018
SAIL
 
"Legal implementation barriers of privacy-preserving technologies" eLAW prese...
"Legal implementation barriers of privacy-preserving technologies" eLAW prese..."Legal implementation barriers of privacy-preserving technologies" eLAW prese...
"Legal implementation barriers of privacy-preserving technologies" eLAW prese...
e-SIDES.eu
 
e-SIDES workshop at ICT 2018, Vienna 5/12/2018
e-SIDES workshop at ICT 2018, Vienna 5/12/2018e-SIDES workshop at ICT 2018, Vienna 5/12/2018
e-SIDES workshop at ICT 2018, Vienna 5/12/2018
e-SIDES.eu
 
Homeland Open Security Technologies (HOST)
Homeland Open Security Technologies (HOST)Homeland Open Security Technologies (HOST)
Homeland Open Security Technologies (HOST)
Joshua L. Davis
 
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxComputer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
donnajames55
 
Internet governance and the filtering problems
Internet governance and the filtering problemsInternet governance and the filtering problems
Internet governance and the filtering problems
Tan Tran
 
Building A Modern Security Policy For Social Media and Government
Building A  Modern  Security  Policy For  Social  Media and GovernmentBuilding A  Modern  Security  Policy For  Social  Media and Government
Building A Modern Security Policy For Social Media and Government
Michael Smith
 
IoT system development.pdf
IoT system development.pdfIoT system development.pdf
IoT system development.pdf
Mahdi_Fahmideh
 
Module 5 ig presentation iran 2
Module 5 ig presentation iran 2Module 5 ig presentation iran 2
Module 5 ig presentation iran 2
Habib Noroozi
 
Re thinking regulation at the age of AI
Re thinking regulation at the age of AIRe thinking regulation at the age of AI
Re thinking regulation at the age of AI
Lofred Madzou
 
Chapter 4 Ethical and Social Issues in Information Systems
Chapter 4 Ethical and Social Issues in Information SystemsChapter 4 Ethical and Social Issues in Information Systems
Chapter 4 Ethical and Social Issues in Information Systems
Sammer Qader
 
Personal Data and Trust Network inaugural Event 11 march 2015 - record
Personal Data and Trust Network inaugural Event   11 march 2015 - recordPersonal Data and Trust Network inaugural Event   11 march 2015 - record
Personal Data and Trust Network inaugural Event 11 march 2015 - record
Digital Catapult
 
The Internet of Things: What's next?
The Internet of Things: What's next? The Internet of Things: What's next?
The Internet of Things: What's next?
PayamBarnaghi
 
Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...
Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...
Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...Karlos Svoboda
 
acatech_STUDY_Internet_Privacy_WEB
acatech_STUDY_Internet_Privacy_WEBacatech_STUDY_Internet_Privacy_WEB
acatech_STUDY_Internet_Privacy_WEBJaina Hirai
 
The Internet of Things: An Overview (IoT) ISOC SFO Chapter INET
The Internet of Things: An Overview (IoT) ISOC SFO Chapter INETThe Internet of Things: An Overview (IoT) ISOC SFO Chapter INET
The Internet of Things: An Overview (IoT) ISOC SFO Chapter INET
Karen Rose
 
Global Tech Security Commission Overview
Global Tech Security Commission Overview Global Tech Security Commission Overview
Global Tech Security Commission Overview
Keith Krach
 

Similar to Review of Previous ETAP Forums - Deepak Maheshwari (20)

Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
 
Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...
Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...
Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...
 
Sail regulation governance 101018
Sail regulation governance 101018Sail regulation governance 101018
Sail regulation governance 101018
 
"Legal implementation barriers of privacy-preserving technologies" eLAW prese...
"Legal implementation barriers of privacy-preserving technologies" eLAW prese..."Legal implementation barriers of privacy-preserving technologies" eLAW prese...
"Legal implementation barriers of privacy-preserving technologies" eLAW prese...
 
e-SIDES workshop at ICT 2018, Vienna 5/12/2018
e-SIDES workshop at ICT 2018, Vienna 5/12/2018e-SIDES workshop at ICT 2018, Vienna 5/12/2018
e-SIDES workshop at ICT 2018, Vienna 5/12/2018
 
Homeland Open Security Technologies (HOST)
Homeland Open Security Technologies (HOST)Homeland Open Security Technologies (HOST)
Homeland Open Security Technologies (HOST)
 
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxComputer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
 
Internet governance and the filtering problems
Internet governance and the filtering problemsInternet governance and the filtering problems
Internet governance and the filtering problems
 
Building A Modern Security Policy For Social Media and Government
Building A  Modern  Security  Policy For  Social  Media and GovernmentBuilding A  Modern  Security  Policy For  Social  Media and Government
Building A Modern Security Policy For Social Media and Government
 
IoT system development.pdf
IoT system development.pdfIoT system development.pdf
IoT system development.pdf
 
IEEE-SMC-TCHS 2016
IEEE-SMC-TCHS 2016IEEE-SMC-TCHS 2016
IEEE-SMC-TCHS 2016
 
Module 5 ig presentation iran 2
Module 5 ig presentation iran 2Module 5 ig presentation iran 2
Module 5 ig presentation iran 2
 
Re thinking regulation at the age of AI
Re thinking regulation at the age of AIRe thinking regulation at the age of AI
Re thinking regulation at the age of AI
 
Chapter 4 Ethical and Social Issues in Information Systems
Chapter 4 Ethical and Social Issues in Information SystemsChapter 4 Ethical and Social Issues in Information Systems
Chapter 4 Ethical and Social Issues in Information Systems
 
Personal Data and Trust Network inaugural Event 11 march 2015 - record
Personal Data and Trust Network inaugural Event   11 march 2015 - recordPersonal Data and Trust Network inaugural Event   11 march 2015 - record
Personal Data and Trust Network inaugural Event 11 march 2015 - record
 
The Internet of Things: What's next?
The Internet of Things: What's next? The Internet of Things: What's next?
The Internet of Things: What's next?
 
Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...
Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...
Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...
 
acatech_STUDY_Internet_Privacy_WEB
acatech_STUDY_Internet_Privacy_WEBacatech_STUDY_Internet_Privacy_WEB
acatech_STUDY_Internet_Privacy_WEB
 
The Internet of Things: An Overview (IoT) ISOC SFO Chapter INET
The Internet of Things: An Overview (IoT) ISOC SFO Chapter INETThe Internet of Things: An Overview (IoT) ISOC SFO Chapter INET
The Internet of Things: An Overview (IoT) ISOC SFO Chapter INET
 
Global Tech Security Commission Overview
Global Tech Security Commission Overview Global Tech Security Commission Overview
Global Tech Security Commission Overview
 

More from vpnmentor

On the Bit Security of Cryptographic Primitives. by Michael Walter
On the Bit Security of Cryptographic Primitives. by Michael Walter On the Bit Security of Cryptographic Primitives. by Michael Walter
On the Bit Security of Cryptographic Primitives. by Michael Walter
vpnmentor
 
Homomorphic Lower Digit Removal and Improved FHE Bootstrapping by Kyoohyung Han
Homomorphic Lower Digit Removal and Improved FHE Bootstrapping by Kyoohyung HanHomomorphic Lower Digit Removal and Improved FHE Bootstrapping by Kyoohyung Han
Homomorphic Lower Digit Removal and Improved FHE Bootstrapping by Kyoohyung Han
vpnmentor
 
Michael schapira - Hebrew University Jeruslaem - Secure Internet Routing
Michael schapira - Hebrew University Jeruslaem - Secure Internet RoutingMichael schapira - Hebrew University Jeruslaem - Secure Internet Routing
Michael schapira - Hebrew University Jeruslaem - Secure Internet Routing
vpnmentor
 
India’s National Biometrics ID - Presented by Mr. Deepak Maheshwari
India’s National Biometrics ID - Presented by Mr. Deepak MaheshwariIndia’s National Biometrics ID - Presented by Mr. Deepak Maheshwari
India’s National Biometrics ID - Presented by Mr. Deepak Maheshwari
vpnmentor
 
A research-oriented introduction to the cryptographic currencies (starting wi...
A research-oriented introduction to the cryptographic currencies (starting wi...A research-oriented introduction to the cryptographic currencies (starting wi...
A research-oriented introduction to the cryptographic currencies (starting wi...
vpnmentor
 
Alternative cryptocurrencies
Alternative cryptocurrenciesAlternative cryptocurrencies
Alternative cryptocurrencies
vpnmentor
 
Smart contracts and applications part II
Smart contracts and applications   part IISmart contracts and applications   part II
Smart contracts and applications part II
vpnmentor
 
Mining pools and attacks
Mining pools and attacksMining pools and attacks
Mining pools and attacks
vpnmentor
 
Smart contracts and applications part I
Smart contracts and applications   part ISmart contracts and applications   part I
Smart contracts and applications part I
vpnmentor
 
Alternative cryptocurrencies
Alternative cryptocurrencies Alternative cryptocurrencies
Alternative cryptocurrencies
vpnmentor
 
Automated Analysis of TLS 1.3
Automated Analysis of TLS 1.3Automated Analysis of TLS 1.3
Automated Analysis of TLS 1.3
vpnmentor
 
On the Security of TLS-DHE in the Standard Model
On the Security of TLS-DHE in the Standard ModelOn the Security of TLS-DHE in the Standard Model
On the Security of TLS-DHE in the Standard Model
vpnmentor
 
TLS: Past, Present, Future
TLS: Past, Present, FutureTLS: Past, Present, Future
TLS: Past, Present, Future
vpnmentor
 
On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption
On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 EncryptionOn the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption
On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption
vpnmentor
 

More from vpnmentor (14)

On the Bit Security of Cryptographic Primitives. by Michael Walter
On the Bit Security of Cryptographic Primitives. by Michael Walter On the Bit Security of Cryptographic Primitives. by Michael Walter
On the Bit Security of Cryptographic Primitives. by Michael Walter
 
Homomorphic Lower Digit Removal and Improved FHE Bootstrapping by Kyoohyung Han
Homomorphic Lower Digit Removal and Improved FHE Bootstrapping by Kyoohyung HanHomomorphic Lower Digit Removal and Improved FHE Bootstrapping by Kyoohyung Han
Homomorphic Lower Digit Removal and Improved FHE Bootstrapping by Kyoohyung Han
 
Michael schapira - Hebrew University Jeruslaem - Secure Internet Routing
Michael schapira - Hebrew University Jeruslaem - Secure Internet RoutingMichael schapira - Hebrew University Jeruslaem - Secure Internet Routing
Michael schapira - Hebrew University Jeruslaem - Secure Internet Routing
 
India’s National Biometrics ID - Presented by Mr. Deepak Maheshwari
India’s National Biometrics ID - Presented by Mr. Deepak MaheshwariIndia’s National Biometrics ID - Presented by Mr. Deepak Maheshwari
India’s National Biometrics ID - Presented by Mr. Deepak Maheshwari
 
A research-oriented introduction to the cryptographic currencies (starting wi...
A research-oriented introduction to the cryptographic currencies (starting wi...A research-oriented introduction to the cryptographic currencies (starting wi...
A research-oriented introduction to the cryptographic currencies (starting wi...
 
Alternative cryptocurrencies
Alternative cryptocurrenciesAlternative cryptocurrencies
Alternative cryptocurrencies
 
Smart contracts and applications part II
Smart contracts and applications   part IISmart contracts and applications   part II
Smart contracts and applications part II
 
Mining pools and attacks
Mining pools and attacksMining pools and attacks
Mining pools and attacks
 
Smart contracts and applications part I
Smart contracts and applications   part ISmart contracts and applications   part I
Smart contracts and applications part I
 
Alternative cryptocurrencies
Alternative cryptocurrencies Alternative cryptocurrencies
Alternative cryptocurrencies
 
Automated Analysis of TLS 1.3
Automated Analysis of TLS 1.3Automated Analysis of TLS 1.3
Automated Analysis of TLS 1.3
 
On the Security of TLS-DHE in the Standard Model
On the Security of TLS-DHE in the Standard ModelOn the Security of TLS-DHE in the Standard Model
On the Security of TLS-DHE in the Standard Model
 
TLS: Past, Present, Future
TLS: Past, Present, FutureTLS: Past, Present, Future
TLS: Past, Present, Future
 
On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption
On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 EncryptionOn the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption
On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption
 

Recently uploaded

Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
SEO Article Boost
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
GTProductions1
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
zoowe
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
Danica Gill
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
vmemo1
 
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
JeyaPerumal1
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
nhiyenphan2005
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
CIOWomenMagazine
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
harveenkaur52
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Florence Consulting
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
cuobya
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 

Recently uploaded (20)

Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
 
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 

Review of Previous ETAP Forums - Deepak Maheshwari

  • 1. Review of Previous ETAP Forums 22 June 2016 – Tel Aviv, Israel Deepak Maheshwari 1
  • 2. IEEE Internet Initiative (3I): Connecting the Global Technology & Policy Making Communities on Internet Governance, Cybersecurity, and Privacy The IEEE Internet Initiative connects the technology and policy making communities, both at a global and local level, in order to: – Inform debate and decisions – Ensure trustworthy technology solutions and best practices The IEEE Internet Initiative facilitates the engagement of technology, industry and policy experts in a neutral environment for the collective benefit of all stakeholders Technology Experts Policy Makers IEEE Internet Initiative 2
  • 3. IEEE Experts in Technology and Policy (ETAP) Forums The ETAP Forums are a series of events that bring together technology developers and policy makers to debate current and future Internet technology policy issues that impact everyone on a global, national, and local level “Local conversations on a global scale” Five previous ETAP Forums: – San Jose, USA, May 2015 – Tel Aviv, Israel, August 2015 – Washington DC, USA, February 2016 – Delhi, India, March 2016 – Beijing, China, May 2016 3
  • 4. General ETAP Agenda Structure Introduction Keynote presentations Rapid-fire round for everyone to introduce their most important issue Panel discussion Ranking and selection of top rapid-fire issues for breakout discussions Breakout sessions Breakout summaries Actions and wrap up 4
  • 5. ETAP Forum San Jose, USA May 2015 Inaugural ETAP Forum Goal: Identify key issues to be addressed, and build kernel of expert community for follow-on work 40 participants from 5 regions: China, India, Africa, Europe, North America 5
  • 6. San Jose: Top 6 of 20 Identified Issues 1. Threats and opportunities in data analytics 2. Multi‐stakeholder Internet governance 3. Protecting Internet traffic, managing meta‐data analysis, and how to implement both security and privacy at scale 4. Fragmentation of the Internet due to local policies and how to avoid it 5. Algorithmic decision making that exacerbates existing power balances and ethical concerns 6. How to best engage IEEE as a platform for contributing to the resolution of these and related issues 6
  • 7. San Jose: Proposed Actions Conduct additional ETAP Forums around the world, to collate diversity of regional views Future ETAP Forums should focus on and refine the six top issues identified, with the goal of moving several to a format for action Open nature of ETAP Forums should allow regional participants to introduce priority issues of their own 7
  • 8. ETAP Forum Tel Aviv, Israel August 2015 30 participants from 4 regions: Middle East, India, Europe, North America Many participants were local, but included representation from government, industry, law, academia 8
  • 9. Tel Aviv 2015: Top 3 of 13 Identified Issues 1.User assessment of trustworthiness of devices, enterprises and governments 2.Educating users about characteristics of information society 3.Machine-readable privacy agreements and who enforces them 9
  • 10. Tel Aviv 2015: Proposed Actions Prepare a draft proposal for a standard for machine-readable privacy agreements Develop educational material such as games and icons that encourage safe and ethical online behavior Consider certification of developers for privacy and security best practices and certification of websites and applications for privacy and security Plan future ETAP Forums in Israel and India in 2016 10
  • 11. ETAP Forum Washington DC, USA February 2016 50 participants from 4 regions: Russia, Japan, India, North America Many participants were local, including representation from government, industry, law, academia 11
  • 12. Washington DC: Top 4 of 39 Identified Issues 1.Data localization 2.Education and ethics 3.End-to-end security/privacy by design 4.Technology-policy development process 12
  • 13. Washington DC: Proposed Actions Create tips and tools and/or host events to alleviate tension across technical and regulatory communities and policy makers of different jurisdictions Identify fundamental policy principles that are being called into question by the proliferation of the IoT (e.g., right to opt in/out) Strive to create a layered model (similar to OSI network model) to guide policy for end-to-end security and privacy by design For data localization, develop case studies (e.g., house monitoring, medical devices that travel with users, efficient routing, etc.), gather economic analyses, perform technical analyses, and explore certification for data practices Develop content and programs for education and ethics around IoT, identify partner channels for creation and distribution of the content, and determine performance indicators Continue the conversation on-line, to elaborate on the issues voiced during the rapid-fire brainstorming, and to develop and execute action plans for the above identified opportunities 13
  • 14. First ETAP in a developing country Overarching theme "Universal Access for Social and Economic Inclusion - Technology and Policy Considerations" with specific emphasis on: – Security and Privacy in Biometrics – Emerging Technologies for the Last Mile Access 40 participants from India, North America, Middle East, and beyond Many participants were local, including representation from government, industry, law, academia ETAP Forum Delhi, India March 2016 14
  • 15. Delhi: Top 2 Issues 1.Protecting Internet traffic, managing meta-data analysis, and how to implement both security and privacy at scale 2.Options and challenges in providing universal access for social and economic inclusion 15
  • 16. Delhi: Proposed Actions Development of a white paper on the policy and technology implications of protecting Internet traffic Clarify and refine the scope of a white paper to be written on the options and challenges in providing universal access 16
  • 17. Technical Co-Sponsor: China Internet Network Information Center (CNNIC) Topic: Closing the Cyberspace Policy-Technology Divide to Drive the Future of the Internet Focus Areas: – Assessing technology and policy factors and actors that affect the development and management of the Internet – Global acceptance of technology protocols and standards versus policy localization – Building an environment that enables the interaction of technologists and policy makers 60 participants, including representation from government, industry, law, academia ETAP Forum Beijing, China May 2016 17
  • 18. Beijing: Top 3 of 18 Identified Issues Cyber-threats to critical infrastructure, including eGovernment/eCommerce Biodiversity in the Internet ecosystem Transparency as a source for obtaining data for evidence-based decision making 18
  • 19. Beijing: Proposed Actions Create threat intelligence standards that define threat terminology, categorize the various types of threats, and create methodologies for sharing information about threats Create a platform to allow researchers, industry, and authorities to carry out a range of important tasks in combating cyber-threats to critical infrastructure Create a standardized benchmark for transparency that could address questions such as how to measure and track transparency over time Policymakers and technologists can play a role as conscientious “gardeners” to ensure diversity, resilience, and sustainability of the Internet ecology 19
  • 20. Summary of Top Identified Issues in Internet Technology Policy Threats and opportunities in data analytics Algorithmic decision making that exacerbates existing power balances and ethical concerns Multi-stakeholder Internet governance Technology-policy development process Protecting Internet traffic, managing meta-data analysis, and how to implement both security and privacy at scale End-to-end security and privacy by design Fragmentation of the Internet, and data localization due to local policies User assessment of trustworthiness of devices, enterprises and governments Machine-readable privacy agreements, and who enforces them Educating users about characteristics of information society and ethics Options and challenges in providing universal access for social and economic inclusion 20
  • 22. Whitepapers and Research Standard for Machine readable privacy agreements, lead by Ori Freiman, Jonathan Klinger Protecting Internet traffic (encrypted by default), led by Prasad Mantri, Dr Dattareya Kulkarni and Rahul Sharma. Options and challenges in providing universal access, lead by Prasad Mantri, Subrat Kumar Prusty End to end trust and security in IoT, lead by Peter Fonash, Brian Done (DHS), Chris Hrivnak and Alan Chachich Algorithmic decision making Threats and opportunities in data analytics (Standard to anonymize data). 22
  • 23. Get Involved: ITP Community 23 Start new discussions in the Collabratec™ ITP community by posting relevant issues and asking questions Open your own private group in Collabratec™ then invite others to research and co-author with you around specific topics Participate in and help organize regional Experts in Technology and Policy (ETAP) events; then lead follow-up activities around the resulting outputs and takeaways Participate in IEEE Internet Initiative webinars and other online panel discussions http://internetinitiative.ieee.org

Editor's Notes

  1. The IEEE Internet Initiative connects the technical community to global policymaking for Internet governance, cybersecurity and privacy—to inform debate and decisions, and to help ensure trustworthy technology solutions and best practices.   Through the initiative, IEEE is connecting engineers, scientists, industry leaders and others engaged in an array of technology and industry domains globally, with policy experts, in a neutral environment for the collective benefit of all stakeholders. Not only does the IEEE Internet Initiative help improve the state of knowledge about technology and its implications and impact on Internet governance issues, it also raises awareness of public policy issues and processes in the global technical community.