SlideShare a Scribd company logo
1 of 12
互聯網的挑戰與機遇 莫乃光 香港互聯網協會 主席 2008.3.16
從照片事件說起 ,[object Object],[object Object],[object Object],[object Object],[object Object]
多面睇 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
多面睇 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
多面睇 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
多面睇 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
檢討法例 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
互聯網立法 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
「網樂 R 計劃」 (Project Net Respect)  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
「網樂 R 計劃」 (Project Net Respect) ,[object Object],[object Object],[object Object],[object Object],[object Object]
總結 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
謝謝! ,[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

Similar to 互聯網的挑戰與機遇

安全 隱私 自由和道德
安全 隱私 自由和道德安全 隱私 自由和道德
安全 隱私 自由和道德伯謙 周
 
安全 隱私 自由和道德
安全 隱私 自由和道德安全 隱私 自由和道德
安全 隱私 自由和道德祖宏 李
 
生活中常見的網路治理議題 Internet governance Issue in our life
生活中常見的網路治理議題 Internet governance Issue in our life 生活中常見的網路治理議題 Internet governance Issue in our life
生活中常見的網路治理議題 Internet governance Issue in our life YingChu Chen
 
C:\Fakepath\簡報1
C:\Fakepath\簡報1C:\Fakepath\簡報1
C:\Fakepath\簡報1starry505
 
Technolgy and Education
Technolgy and EducationTechnolgy and Education
Technolgy and Educationstarry505
 
Technolgy and Education
Technolgy and EducationTechnolgy and Education
Technolgy and Educationstarry505
 
Intellectual property infringement damages applicable law transnational Compe...
Intellectual property infringement damages applicable law transnational Compe...Intellectual property infringement damages applicable law transnational Compe...
Intellectual property infringement damages applicable law transnational Compe...英傑 賴
 
社会传播2
社会传播2社会传播2
社会传播2Hao Dong
 
資訊立法策進聯盟成員介紹
資訊立法策進聯盟成員介紹資訊立法策進聯盟成員介紹
資訊立法策進聯盟成員介紹YenLin Huang
 
[2012 09]this weeks share-0424
[2012 09]this weeks share-0424[2012 09]this weeks share-0424
[2012 09]this weeks share-0424Bo Shen
 
【網路智慧新臺灣政策白皮書】構面一:基礎環境
【網路智慧新臺灣政策白皮書】構面一:基礎環境【網路智慧新臺灣政策白皮書】構面一:基礎環境
【網路智慧新臺灣政策白皮書】構面一:基礎環境R.O.C.Executive Yuan
 
在中国推进开源软件的有关问题-倪光南
在中国推进开源软件的有关问题-倪光南在中国推进开源软件的有关问题-倪光南
在中国推进开源软件的有关问题-倪光南Steven Cheng
 
解读信息设计[郭俊]Final
解读信息设计[郭俊]Final解读信息设计[郭俊]Final
解读信息设计[郭俊]Finaldasiyjun
 
政府如何监控我们的电子网络通讯
政府如何监控我们的电子网络通讯政府如何监控我们的电子网络通讯
政府如何监控我们的电子网络通讯charles lee
 
Cyber security management act openfind 20201203
Cyber security management act openfind 20201203Cyber security management act openfind 20201203
Cyber security management act openfind 20201203openfind
 
互联网用户网络行为调查
互联网用户网络行为调查互联网用户网络行为调查
互联网用户网络行为调查Caitlin123
 

Similar to 互聯網的挑戰與機遇 (20)

安全 隱私 自由和道德
安全 隱私 自由和道德安全 隱私 自由和道德
安全 隱私 自由和道德
 
安全 隱私 自由和道德
安全 隱私 自由和道德安全 隱私 自由和道德
安全 隱私 自由和道德
 
生活中常見的網路治理議題 Internet governance Issue in our life
生活中常見的網路治理議題 Internet governance Issue in our life 生活中常見的網路治理議題 Internet governance Issue in our life
生活中常見的網路治理議題 Internet governance Issue in our life
 
C:\Fakepath\簡報1
C:\Fakepath\簡報1C:\Fakepath\簡報1
C:\Fakepath\簡報1
 
Technolgy and Education
Technolgy and EducationTechnolgy and Education
Technolgy and Education
 
Technolgy and Education
Technolgy and EducationTechnolgy and Education
Technolgy and Education
 
Intellectual property infringement damages applicable law transnational Compe...
Intellectual property infringement damages applicable law transnational Compe...Intellectual property infringement damages applicable law transnational Compe...
Intellectual property infringement damages applicable law transnational Compe...
 
社会传播2
社会传播2社会传播2
社会传播2
 
資訊立法策進聯盟成員介紹
資訊立法策進聯盟成員介紹資訊立法策進聯盟成員介紹
資訊立法策進聯盟成員介紹
 
[2012 09]this weeks share-0424
[2012 09]this weeks share-0424[2012 09]this weeks share-0424
[2012 09]this weeks share-0424
 
【網路智慧新臺灣政策白皮書】構面一:基礎環境
【網路智慧新臺灣政策白皮書】構面一:基礎環境【網路智慧新臺灣政策白皮書】構面一:基礎環境
【網路智慧新臺灣政策白皮書】構面一:基礎環境
 
在中国推进开源软件的有关问题-倪光南
在中国推进开源软件的有关问题-倪光南在中国推进开源软件的有关问题-倪光南
在中国推进开源软件的有关问题-倪光南
 
番茄工作法
番茄工作法番茄工作法
番茄工作法
 
OPEN 講 iii
OPEN 講 iiiOPEN 講 iii
OPEN 講 iii
 
解读信息设计[郭俊]Final
解读信息设计[郭俊]Final解读信息设计[郭俊]Final
解读信息设计[郭俊]Final
 
政府如何监控我们的电子网络通讯
政府如何监控我们的电子网络通讯政府如何监控我们的电子网络通讯
政府如何监控我们的电子网络通讯
 
Cyber security management act openfind 20201203
Cyber security management act openfind 20201203Cyber security management act openfind 20201203
Cyber security management act openfind 20201203
 
20161112
20161112 20161112
20161112
 
邀請信
邀請信邀請信
邀請信
 
互联网用户网络行为调查
互联网用户网络行为调查互联网用户网络行为调查
互联网用户网络行为调查
 

More from Charles Mok

Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismCharles Mok
 
Threats to the Internet
Threats to the Internet Threats to the Internet
Threats to the Internet Charles Mok
 
Cyber Risks in Hong Kong
Cyber Risks in Hong KongCyber Risks in Hong Kong
Cyber Risks in Hong KongCharles Mok
 
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through CompulsionICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through CompulsionCharles Mok
 
全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇Charles Mok
 
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology FragmentationDigital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology FragmentationCharles Mok
 
HKU Tech for Good year2.pdf
HKU Tech for Good year2.pdfHKU Tech for Good year2.pdf
HKU Tech for Good year2.pdfCharles Mok
 
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for DemocracyTechnology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for DemocracyCharles Mok
 
APAC Data Center Infrastructure Observations
APAC Data Center Infrastructure ObservationsAPAC Data Center Infrastructure Observations
APAC Data Center Infrastructure ObservationsCharles Mok
 
Chinese Digital Repression
Chinese Digital RepressionChinese Digital Repression
Chinese Digital RepressionCharles Mok
 
Technology, Data and Ethics
Technology, Data and EthicsTechnology, Data and Ethics
Technology, Data and EthicsCharles Mok
 
全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇Charles Mok
 
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdfCharles Mok
 
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdfCensorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdfCharles Mok
 
HKU Tech for Good.pdf
HKU Tech for Good.pdfHKU Tech for Good.pdf
HKU Tech for Good.pdfCharles Mok
 
Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...Charles Mok
 
Misinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldMisinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldCharles Mok
 
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and TrendsFrom Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and TrendsCharles Mok
 
From Crypto to Trust and Identity
From Crypto to Trust and IdentityFrom Crypto to Trust and Identity
From Crypto to Trust and IdentityCharles Mok
 
Have you AI'ed today? A Reality Check
Have you AI'ed today? A Reality CheckHave you AI'ed today? A Reality Check
Have you AI'ed today? A Reality CheckCharles Mok
 

More from Charles Mok (20)

Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
 
Threats to the Internet
Threats to the Internet Threats to the Internet
Threats to the Internet
 
Cyber Risks in Hong Kong
Cyber Risks in Hong KongCyber Risks in Hong Kong
Cyber Risks in Hong Kong
 
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through CompulsionICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
 
全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇
 
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology FragmentationDigital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
 
HKU Tech for Good year2.pdf
HKU Tech for Good year2.pdfHKU Tech for Good year2.pdf
HKU Tech for Good year2.pdf
 
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for DemocracyTechnology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
 
APAC Data Center Infrastructure Observations
APAC Data Center Infrastructure ObservationsAPAC Data Center Infrastructure Observations
APAC Data Center Infrastructure Observations
 
Chinese Digital Repression
Chinese Digital RepressionChinese Digital Repression
Chinese Digital Repression
 
Technology, Data and Ethics
Technology, Data and EthicsTechnology, Data and Ethics
Technology, Data and Ethics
 
全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇
 
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
 
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdfCensorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
 
HKU Tech for Good.pdf
HKU Tech for Good.pdfHKU Tech for Good.pdf
HKU Tech for Good.pdf
 
Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...
 
Misinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldMisinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the World
 
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and TrendsFrom Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
 
From Crypto to Trust and Identity
From Crypto to Trust and IdentityFrom Crypto to Trust and Identity
From Crypto to Trust and Identity
 
Have you AI'ed today? A Reality Check
Have you AI'ed today? A Reality CheckHave you AI'ed today? A Reality Check
Have you AI'ed today? A Reality Check
 

互聯網的挑戰與機遇