The right to be forgotten is “The right to silence on past events in life that are no longer occurring”, which means keeping the data for as long as needed and then destroy or archive them.
Computers and the Internet-Of-Things generate data about our every move, passing thought or feeling. There is also a comprehensive set of data on our life’s context: our whereabouts, connections, physiological state, patterns of movement, and deeply ingrained subconscious behaviors. While that information may not be immediately visible or easy to learn from, it is created, collected and saved. Over time, the pile of data grows. The processing technologies become more sophisticated and powerful. No data is ever “forgotten”. In this session we will look at data that’s currently collected by popular services, the implications of cross-processing streams of data from different sources, and the power of metadata. There are no more secrets. Based on “Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World” by Bruce Schneier.
General Data Protection Regulation (GDPR) - Cross-Border Data Transferspi
The General Data Protection Regulation will Impact all health data processing companies because of the growing importance of customer and patient data to the manufacturer’s business. All companies have to be compliant by 25th May 2018.
This presentation gives an overview of all the possibilities included in the GDPR to allow Cross-Border Data Transfers to third countries.
GDPR vs US Regulations: Their differences and Commonalities with ISO/IEC 27701PECB
Based on online data, GDPR fines increased by 40% in 2020, compared to the previous years since the law came into force, and they are expected to increase even more in the upcoming years.
In this light, organizations are facing challenges when it comes to compliance with the increased number of data privacy laws and regulations worldwide.
The webinar covers
• ISO/IEC 27701 standard and its requirements
• GDPR requirements and principles mapped against ISO/IEC 27701
• An overview of CCPA requirements
• Upcoming US privacy laws
Find out more about ISO training and certification services
Training: https://pecb.com/whitepaper/iso-27001-information-technology--security-techniques-information-security--management-systems---requirements
https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27701
Webinars: https://pecb.com/webinars
Articles: https://pecb.com/article
Whitepapers: https://pecb.com/whitepaper
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
YouTube video: https://youtu.be/QGqJsh4kedM
Website link: https://pecb.com/
General Data Protection Regulations (GDPR): Do you understand it and are you ...Cvent
Whether you’re an event or hospitality professional in a small, medium or large organization, the General Data Protection Regulation (GDPR) is going to affect you. Get prepared with Cvent and Debrah Harding of Market Research Society before the 25th May deadline. GDPR is a new EU regulation, designed for the digital age. GDPR will strengthen an individual's rights and increase business accountability for data privacy and holding personal information. Organizations found breaching the regulations can face fines of up to 20 million Euros or up to 4% of annual global turnover. At Cvent we are already on track to becoming GDPR compliant and we want to advise our industry partners on how to become compliant too.
Computers and the Internet-Of-Things generate data about our every move, passing thought or feeling. There is also a comprehensive set of data on our life’s context: our whereabouts, connections, physiological state, patterns of movement, and deeply ingrained subconscious behaviors. While that information may not be immediately visible or easy to learn from, it is created, collected and saved. Over time, the pile of data grows. The processing technologies become more sophisticated and powerful. No data is ever “forgotten”. In this session we will look at data that’s currently collected by popular services, the implications of cross-processing streams of data from different sources, and the power of metadata. There are no more secrets. Based on “Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World” by Bruce Schneier.
General Data Protection Regulation (GDPR) - Cross-Border Data Transferspi
The General Data Protection Regulation will Impact all health data processing companies because of the growing importance of customer and patient data to the manufacturer’s business. All companies have to be compliant by 25th May 2018.
This presentation gives an overview of all the possibilities included in the GDPR to allow Cross-Border Data Transfers to third countries.
GDPR vs US Regulations: Their differences and Commonalities with ISO/IEC 27701PECB
Based on online data, GDPR fines increased by 40% in 2020, compared to the previous years since the law came into force, and they are expected to increase even more in the upcoming years.
In this light, organizations are facing challenges when it comes to compliance with the increased number of data privacy laws and regulations worldwide.
The webinar covers
• ISO/IEC 27701 standard and its requirements
• GDPR requirements and principles mapped against ISO/IEC 27701
• An overview of CCPA requirements
• Upcoming US privacy laws
Find out more about ISO training and certification services
Training: https://pecb.com/whitepaper/iso-27001-information-technology--security-techniques-information-security--management-systems---requirements
https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27701
Webinars: https://pecb.com/webinars
Articles: https://pecb.com/article
Whitepapers: https://pecb.com/whitepaper
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
YouTube video: https://youtu.be/QGqJsh4kedM
Website link: https://pecb.com/
General Data Protection Regulations (GDPR): Do you understand it and are you ...Cvent
Whether you’re an event or hospitality professional in a small, medium or large organization, the General Data Protection Regulation (GDPR) is going to affect you. Get prepared with Cvent and Debrah Harding of Market Research Society before the 25th May deadline. GDPR is a new EU regulation, designed for the digital age. GDPR will strengthen an individual's rights and increase business accountability for data privacy and holding personal information. Organizations found breaching the regulations can face fines of up to 20 million Euros or up to 4% of annual global turnover. At Cvent we are already on track to becoming GDPR compliant and we want to advise our industry partners on how to become compliant too.
Lee Rainie, Director, Internet, Science and Technology from the Pew Research Center to delivered a keynote address at WAN-IFRA’s first World Media Policy Forum. Rainie is one of the world’s top academic researchers on the internet and the social changes triggered by information and communication technologies (ICT.) He talked about what research is showing us about privacy strategies and statistics.
Data transfers to countries outside the EU/EEA under the GDPRIT Governance Ltd
These slides will cover:
-A brief overview of the Regulation and its impact
-The rights of data subjects and rights related to automated decision making and profiling.
-The international transfer of data and appropriate safeguards.
-The derogations from general prohibition of data transfers outside the European Union.
-The requirements that govern one-off and infrequent transfers of personal data.
-The role of the supervisory authority in international transfers.
Implikasi UU PDP terhadap Tata Kelola Data Sektor Kesehatan - Rangkuman UU Pe...Eryk Budi Pratama
Sosialisasi UU Pelindungan Data Pribadi untuk sektor kesehatan.
Webinar Serial TIK I-2022
Diselenggarakan oleh:
*INDOHCF - KREKI - IODTI - FORKOMTIKNAS - Z-COURSE*
TOPIK:
*Implikasi UU PDP (Perlindungan Data Pribadi) Terhadap Tata Kelola Data di Sektor Kesehatan*
Rancangan Undang - Undang (RUU) Perlindungan Data Pribadi (PDP) telah resmi disahkan menjadi Undang-Undang (UU) dalam Rapat Paripurna DPR RI pada tanggal 20 Sept 2022. Sambil menunggu peraturan pelaksanaannya, maka perlu lebih mencermati isi regulasi tsb dan mendiskusikan bagaimana implikasinya bagi sektor kesehatan baik Faskes, BPJS, Masyarakat dan stakeholder kesehatan lainnya
Understanding the EU's new General Data Protection Regulation (GDPR)Acquia
In 2016, the European Union (EU) approved its General Data Protection Regulation (GDPR) to protect European citizens’ data. As a regulation, the GDPR does not require the implementation of legislation, and will immediately become an applicable law as of the 25th of May, 2018.
What is GDPR exactly trying to accomplish? According to the official documents, the goal is the “protection of natural persons with regard to the processing of personal data and on the free movement of such data.”
In short, organizations that conduct business in the EU will need to be compliant with GDPR, and must come to terms with the huge fines that non-compliance can carry. Fines can be up to €20M or 4% of the annual turnover. For companies that experience breaches that result in the loss of personal data (such as Talk Talk, which lost 170,000 people’s data), the fines will be tremendous.
Join us for discussion about GDPR to learn more about:
The principles that organizations that use personal data need to adhere to
The consequences organizations can face if that do not adhere to this new regulation
How your organization can prepare for the future
Accountability under the GDPR: What does it mean for Boards & Senior Management?IT Governance Ltd
This webinar provides an overview of:
- The principle of accountability and what it means
- Applying the principle of accountability
- Developing policies and procedures that comply with the Regulation
- Raising GDPR awareness and providing employees with training
- The board's responsibility to appoint a dedicated data privacy team of DPO
- The requirement to conduct data privacy audits and impact assessments
A recording of this webinar is available here:
https://www.youtube.com/watch?v=6KGeMwz7jro&feature=youtu.be
An Overview of the new GDPR regulations including:
• Data Protection Frame Work
• GDPR – Responsibilities
• GDPR – Changes
• GDPR - Exemptions
• GDPR – Rights
• Penalty
• Ten High Level Steps
Presented at: 2nd Annual Gulf Cooperation Council e-Participation & e-Governance Forum – Organised by: Abu Dhabi University Knowledge Group and UAE Telecommunications Regulatory Authority.
9 – 11 September 2013 | Dusit Thani Hotel | Abu Dhabi | UAE.
This webinar provides an overview of:
- The regulatory landscape
- Territorial scope
- Remedies, liabilities and penalties
- Risk management and the GDPR
- Legal requirement for a DPIA
- Why and how to conduct a data flow mapping exercise
- What are the challenges?
- What is an information flow?
- The questions to ask
- Data flow mapping techniques.
A recording of this webinar is available here:
https://youtu.be/EZFgrmzmPYE
We now have to obey the law and comply with GDPR, ensuring people's data are securely stored, we track who has access to it and if the client requests to review, update or remove their data, we should do so in an automated fashion. But, are you there yet? Chances are, there's still a long way to go.
In this talk I will address some of the challenges we solved in greenfield projects as well in old, legacy applications. We introduced "privacy by design" as just another "by design" mantra we already had build in our workflow and as we worked on the project, we applied it everywhere when we saw user data (personal or not) was processed. This ensured that all data was handled and treated the same way and allowed the business to reorient themselves again to be creative in approaching their customers.
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
Right to Privacy and its Legal Framework, The Concept of Privacy, National Legal
Framework for Protecting Privacy, International Legal Framework for Protecting Privacy, Privacy Related Wrongs and Remedies, Data Security, The Concept of Security in Cyberspace, Technological Vulnerabilities, Legal Response to Technological
Vulnerabilities, Security Audit (VA/PT), Data Protection, Data Protection Position in
India, Privacy Policy, Emerging Issues in Data Protection and Privacy, BPOs and
Legal Regime in India, Protect Kids' Privacy Online, Evolving Trends in Data Protection and Information Security
We have created the bubble context menu, a new design for context menus combined with the bubble cursor to facilitate the access of the most frequent items in a context menu. Thus, we have decided to exploit the bubble cursor technique and incorporate in it the "hot items" principle presented in the paper regarding the bubbling menus.
At first sight, our project looks exactly like a normal bubble cursor. When a user right-clicks on an item, the cursor is surrounded by a bubble that extends its field of action and a number of targets appears. By moving the cursor, according to the basic principle of the bubble cursor, the nearest target is always selected at any time and the bubble is resized dynamically depending on the proximity of surrounding targets.
By right-clicking on an item on the screen, it is expected that a context menu would appear from which the user is able to choose the desired option. The improvement we have made is that what now appears is the bubble context menu: the elements of the context menu are represented as bubbles and arranged in a circle around the bubble cursor.
Their position is fixed and the size depends on the frequency with which you click on them, which means that, if an element is used very often, it will have an extended area, be the first item selectable and provide an easy selection to the user. The user can use a left-click to select the item in focus and a further right-click to close the bubble context menu.
On the other hand, an option that is not frequently used will remain the same size and will have a lower visual impact. We believe that this technique may turn out to be extremely useful: in fact, once the user has learnt the disposition of objects within the context menu, you can scan it without even looking at the menu that has just appeared.
This way, the technique is very similar to the single-stroke gestures from the bubbling menus paper, where the menu uses the curvature of a gesture as a discriminating factor to trigger different commands.
There are several ways to detect emotion. We can briefly list them here:
EEG + BCI
ECG + Cardiovascular signals
Electrodermal activity
Speech + Voice intonation
Facial expressions
Body language
Now we can take a look at their applications!
Lee Rainie, Director, Internet, Science and Technology from the Pew Research Center to delivered a keynote address at WAN-IFRA’s first World Media Policy Forum. Rainie is one of the world’s top academic researchers on the internet and the social changes triggered by information and communication technologies (ICT.) He talked about what research is showing us about privacy strategies and statistics.
Data transfers to countries outside the EU/EEA under the GDPRIT Governance Ltd
These slides will cover:
-A brief overview of the Regulation and its impact
-The rights of data subjects and rights related to automated decision making and profiling.
-The international transfer of data and appropriate safeguards.
-The derogations from general prohibition of data transfers outside the European Union.
-The requirements that govern one-off and infrequent transfers of personal data.
-The role of the supervisory authority in international transfers.
Implikasi UU PDP terhadap Tata Kelola Data Sektor Kesehatan - Rangkuman UU Pe...Eryk Budi Pratama
Sosialisasi UU Pelindungan Data Pribadi untuk sektor kesehatan.
Webinar Serial TIK I-2022
Diselenggarakan oleh:
*INDOHCF - KREKI - IODTI - FORKOMTIKNAS - Z-COURSE*
TOPIK:
*Implikasi UU PDP (Perlindungan Data Pribadi) Terhadap Tata Kelola Data di Sektor Kesehatan*
Rancangan Undang - Undang (RUU) Perlindungan Data Pribadi (PDP) telah resmi disahkan menjadi Undang-Undang (UU) dalam Rapat Paripurna DPR RI pada tanggal 20 Sept 2022. Sambil menunggu peraturan pelaksanaannya, maka perlu lebih mencermati isi regulasi tsb dan mendiskusikan bagaimana implikasinya bagi sektor kesehatan baik Faskes, BPJS, Masyarakat dan stakeholder kesehatan lainnya
Understanding the EU's new General Data Protection Regulation (GDPR)Acquia
In 2016, the European Union (EU) approved its General Data Protection Regulation (GDPR) to protect European citizens’ data. As a regulation, the GDPR does not require the implementation of legislation, and will immediately become an applicable law as of the 25th of May, 2018.
What is GDPR exactly trying to accomplish? According to the official documents, the goal is the “protection of natural persons with regard to the processing of personal data and on the free movement of such data.”
In short, organizations that conduct business in the EU will need to be compliant with GDPR, and must come to terms with the huge fines that non-compliance can carry. Fines can be up to €20M or 4% of the annual turnover. For companies that experience breaches that result in the loss of personal data (such as Talk Talk, which lost 170,000 people’s data), the fines will be tremendous.
Join us for discussion about GDPR to learn more about:
The principles that organizations that use personal data need to adhere to
The consequences organizations can face if that do not adhere to this new regulation
How your organization can prepare for the future
Accountability under the GDPR: What does it mean for Boards & Senior Management?IT Governance Ltd
This webinar provides an overview of:
- The principle of accountability and what it means
- Applying the principle of accountability
- Developing policies and procedures that comply with the Regulation
- Raising GDPR awareness and providing employees with training
- The board's responsibility to appoint a dedicated data privacy team of DPO
- The requirement to conduct data privacy audits and impact assessments
A recording of this webinar is available here:
https://www.youtube.com/watch?v=6KGeMwz7jro&feature=youtu.be
An Overview of the new GDPR regulations including:
• Data Protection Frame Work
• GDPR – Responsibilities
• GDPR – Changes
• GDPR - Exemptions
• GDPR – Rights
• Penalty
• Ten High Level Steps
Presented at: 2nd Annual Gulf Cooperation Council e-Participation & e-Governance Forum – Organised by: Abu Dhabi University Knowledge Group and UAE Telecommunications Regulatory Authority.
9 – 11 September 2013 | Dusit Thani Hotel | Abu Dhabi | UAE.
This webinar provides an overview of:
- The regulatory landscape
- Territorial scope
- Remedies, liabilities and penalties
- Risk management and the GDPR
- Legal requirement for a DPIA
- Why and how to conduct a data flow mapping exercise
- What are the challenges?
- What is an information flow?
- The questions to ask
- Data flow mapping techniques.
A recording of this webinar is available here:
https://youtu.be/EZFgrmzmPYE
We now have to obey the law and comply with GDPR, ensuring people's data are securely stored, we track who has access to it and if the client requests to review, update or remove their data, we should do so in an automated fashion. But, are you there yet? Chances are, there's still a long way to go.
In this talk I will address some of the challenges we solved in greenfield projects as well in old, legacy applications. We introduced "privacy by design" as just another "by design" mantra we already had build in our workflow and as we worked on the project, we applied it everywhere when we saw user data (personal or not) was processed. This ensured that all data was handled and treated the same way and allowed the business to reorient themselves again to be creative in approaching their customers.
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
Right to Privacy and its Legal Framework, The Concept of Privacy, National Legal
Framework for Protecting Privacy, International Legal Framework for Protecting Privacy, Privacy Related Wrongs and Remedies, Data Security, The Concept of Security in Cyberspace, Technological Vulnerabilities, Legal Response to Technological
Vulnerabilities, Security Audit (VA/PT), Data Protection, Data Protection Position in
India, Privacy Policy, Emerging Issues in Data Protection and Privacy, BPOs and
Legal Regime in India, Protect Kids' Privacy Online, Evolving Trends in Data Protection and Information Security
We have created the bubble context menu, a new design for context menus combined with the bubble cursor to facilitate the access of the most frequent items in a context menu. Thus, we have decided to exploit the bubble cursor technique and incorporate in it the "hot items" principle presented in the paper regarding the bubbling menus.
At first sight, our project looks exactly like a normal bubble cursor. When a user right-clicks on an item, the cursor is surrounded by a bubble that extends its field of action and a number of targets appears. By moving the cursor, according to the basic principle of the bubble cursor, the nearest target is always selected at any time and the bubble is resized dynamically depending on the proximity of surrounding targets.
By right-clicking on an item on the screen, it is expected that a context menu would appear from which the user is able to choose the desired option. The improvement we have made is that what now appears is the bubble context menu: the elements of the context menu are represented as bubbles and arranged in a circle around the bubble cursor.
Their position is fixed and the size depends on the frequency with which you click on them, which means that, if an element is used very often, it will have an extended area, be the first item selectable and provide an easy selection to the user. The user can use a left-click to select the item in focus and a further right-click to close the bubble context menu.
On the other hand, an option that is not frequently used will remain the same size and will have a lower visual impact. We believe that this technique may turn out to be extremely useful: in fact, once the user has learnt the disposition of objects within the context menu, you can scan it without even looking at the menu that has just appeared.
This way, the technique is very similar to the single-stroke gestures from the bubbling menus paper, where the menu uses the curvature of a gesture as a discriminating factor to trigger different commands.
There are several ways to detect emotion. We can briefly list them here:
EEG + BCI
ECG + Cardiovascular signals
Electrodermal activity
Speech + Voice intonation
Facial expressions
Body language
Now we can take a look at their applications!
Our partner and sponsor for next event, happening on the 14th of December, is EIT Digital, and they are providing us with such a cool and inspiring speaker we'll disclose in the upcoming days.
EIT Digital is a leading European digital innovation and entrepreneurial education organisation driving Europe's digital transformation. They are also inviting you to join the "Italian Innovation Day 2016", which will take place at the Trento Co-Location Centre in Povo on December 15, 2016
The event will bring together industrial partners, young entrepreneurs, researchers, students as well as the relevant stakeholders in the EIT Digital ecosystem, all committed to Europe's Digital Transformation.
Participants in the Italian Innovation Day 2016 will experience a day packed with interaction opportunities, learning what has been achieved and looking ahead at the evolution of EIT Digital, while discovering hands-on innovation.
Artusi Learning is not only a digital version of the Artusi manual, but a whole blended course to experience the style and the culture of the Italian food. The Artusi Brand guarantees the quality and standards of the Italian cuisine as defined by its Father and author of the cookbook "The Science of Cooking and the Art of Fine dining", Pellegrino Artusi.
Lo sportello online del comune di trento - Trento Smart City WeekGiacomo Fioroni
Presentazione del progetto Sportello telematico Simpatico del Comune di Trento, in occasione dell'evento Trento Smart City Week, tenuto a Trento dal 9 al 15 settembre 206
Some years ago when I was still at the high school I managed to sell 1.2k€ of cosmetics in one day. Yesterday I was invited by my former professor to teach her students how to make "sales", and I prepared these slides (Italian available upon request).
Feel free to re-use and share! <3
DSD Presentation - 12/2009
1. Probleme mit dem Essen:
→ Wenn Essen zum Problem wird
→ Essverhalten und Essstörungen
2. Globalisierung
→ Neue Gerichte kommen nach Deutschland
3. Bio-Produkte
THETHA is a web-tool to promote open transparency for your Government. It allows citizens to verify the location of water springs, together with their quality and queue. Moreover, it allows them to view road disruptions and accidents, while the State can manage them and get to know about illegal dumping sites. This is one of the ideas we worked at during the IEEE ISC2 Hackathon held in Trento on September, 13-14th.
Heart Activity, ECG and all the parameters related to HCI and Affective Computing.
In order to discuss about the Heart Activity and the ECG we need to start from the Cardiovascular System, whose main function is that of transporting substances along the organism.
SpeakerRank is a unique platform which allows events' and conferences' organizers to find the ideal speaker they are looking for, based on expertise, confidence and knowledge from the reviews of the audience.
We developed the initial concept and prototype for the Summer Lido Hackathon in Merano, Italy, which awarded us with the first prize.
Smart & sustainable transportation for everyone by chatbotsFrancesco Bonadiman
The chatbot market is growing very fast, therefore approaching it as soon as possible might lead to a competitive advantage. Chatbots are available on any platform, on any device, at any time. They are incredibly light, responsive, adaptable, and inexperienced users won't even notice it's a robot they are talking to.
The idea is to implement a chatbot to connect the transportation and mountain huts APIs with OpenStreetMap's and Google Maps' APIs. By combining all these data a bot was created which allows users (such as tourists or locals, mostly young people living in the city, but not owning a car) to reach in a "smart" and ecological way the very end of the road and, from there, walk on the mountain paths to the huts. Users can also view charts with info, data and pics of the mountain cabins, which are loaded into the chatbot as HTML5 content. Of course the whole idea can be realized without the focus on mountain cabins, but just receiving the data about public transport and interacting with the chatbot to get times, stops and connections without leaving the messaging app. All this will make it very easy, in term of user-experience and cognitive load to access the service. This will ultimately lead to better (access to) mobility and, consequently, less pollution and congestion.
Read more here: https://ec.europa.eu/transport/themes/research/challenge_en
PageLinker: Integrating Contextual Bookmarks within a BrowserFrancesco Bonadiman
What is PageLinker? A Firefox web browser extension that contextualises navigation by linking web pages together, creating a network of related web pages and showing links only on specific pages.
Die Avenue Verte ist ein neuer Radweg zwischen Paris und London, die ich letzten Sommer mit meinem Vater fuhr.
Die Avenue Verte wurde offiziell im Juni 2012 für die Olympischen Spiele im London eröffnet.Die Route ist noch nicht abgeschlossen und mehrere Abschnitte sind temporär und nicht asphaltiert, so ist es geeignet nur für Hybrid oder Mountainbikes.
Viviamo in un’era dove l’incertezza è la normalità. Per questo le assicurazioni, che vendono questa “percezione di sicurezza”, sono in difficoltà.
Per risolvere questo problema, le assicurazioni devono adottare un cambio totale di paradigma.
Devono “ristrutturare” il modello attuale di assicurazione rivolgendosi ai nuovi bisogni assicurativi degli utenti
E tornare a focalizzarsi sui problemi che hanno gli utenti, e il motivo che li spinge a fare una assicurazione.
Le vere NECESSITA’ della nostra epoca sono:
- avere tutto, disponibile, sul momento, ovunque (on-the-go);
- averlo online, su mobile, a distanza di un tocco;
- poterlo customizzare e cambiare facilmente in base ai propri utilizzi;
- usarlo “quel tanto che basta”, per poi lasciarlo.
Quindi la nostra soluzione si basa sullo sviluppo di un’intelligenza artificiale, che apprende che tipo di utente sei, imparando dai dati che estrapola dal telefono, come ad esempio Social Media, localizzazione e app di fitness, ma anche in futuro sensori, wearables e IoT. Quindi li confronta con quelli di altri utenti attraverso machine learning per determinare un’offerta su misura in base all’indice di rischio calcolato, e riconosci eventuali frodi via anomaly detection. , che predice il rischio di assicurare qualcuno e, di conseguenza, quello che l’utente andrà a pagare per la polizza più adatta ai propri bisogni.
Inoltre abbiamo sviluppato delle APIs che danno la possibilità a qualunque PMI di permettere agli utenti di assicurare un prodotto o servizio, in cambio di una percentuale sulle transazioni.
Presentation for the "Models of Auditory Perception Seminar".
This presentation is about the auditory system and, in particular, the inner ear. After explaining the mechanics of the cochlea in details, I am focusing on the Frequency-Place-Transformation, which takes place along the basilar membrane. This process is then closely connected to the so-called auditory filters and the masking effect. Finally, I am comparing how all these different scales are related to each other.
With this presentation we introduce you to the "EIT Digital Alumni", the Community of graduates from EIT Digital. Our mission is to keep strong connections among fellow Alumni and the EIT Digital ecosystem. Visit our website at http://alumni.eitdigital.eu
Here we are looking at Facebook Financing and the different rounds of investments it went through, both from angel investors, venture capitalists and companies, before the IPO.
For the Vertical Innovation Hackathon in Bolzano, held on 10-11th November 2017, we envisioned a new paradigm for car sharing / pooling, highly reliant on AI and task-based, which means, focused on your meetings, events and destinations.
The slides from my talk at Speck&Tech 3 - "Security & Privacy" about the "Right to be Forgotten", which we might describe as "the right to silence past events in life that are no longer occurring”.
By popular demand, I am sharing the deck from a rather grand conference FFWD held in Zagreb on June 11th. Blurb ensues:
"Society is shifting from a pyramidal structure towards something much more like an eco-system with new relationships between actors. In these uncertain times the role of digital professionals is of providing or smuggling vision and guidance."
OK, don't be shy, tell me what you think.
Three challenges faced by ethical systems in the modern world, and four possible responses to these challenges. Presentation used by David Wood at an event at Newspeak House on 11th January 2017, advocating a technoprogessive approach. For more details of the event, see https://www.meetup.com/London-Futurists/events/235828492/. For a recording of a live video stream of the event, see https://www.youtube.com/edit?video_id=TThdPAkB68M.
The Future of Innovation of Policy - Adam Thierer - Mercatus CenterAdam Thierer
An overview of the future of innovation policy and what governance vision will drive it -- the precautionary principle or permissionless innovation. (By Adam Thierer, Senior Research Fellow, Mercatus Center at George Mason University).
CYBERSECURITY AND CYBERWAR WHAT EVERYONE NEEDS.docxtarifarmarie
CYBERSECURITY AND CYBERWAR
WHAT EVERYONE NEEDS TO KNOW ®
oxfordhb-9780199918096.indd ioxfordhb-9780199918096.indd i 21-10-2013 22:38:1221-10-2013 22:38:12
“In our digital age, the issues of cybersecurity are no longer just for the technology
crowd; they matter to us all. Whether you work in business or politics, the military or the
media—or are simply an ordinary citizen—this is an essential read.”
—Eric Schmidt, Executive Chairman, Google
“This is the most approachable and readable book ever written on the cyber world. The
authors have distilled the key facts and policy, provided sensible recommendations, and
opened the debate generally to any informed citizen: a singular achievement. A must read
for practitioners and scholars alike.”
—Admiral James Stavridis, US Navy (Ret), former NATO Supreme Allied Commander
“In confronting the cybersecurity problem, it’s important for all of us to become knowl-
edgeable and involved. This book makes that possible—and also fascinating. It’s every-
thing you need to know about cybersecurity, wonderfully presented in a clear and smart
way.”
—Walter Isaacson, author of Steve Jobs
“If you read only one book about ‘all this cyberstuff,’ make it this one. Singer and
Friedman know how to make even the most complicated material accessible and even
entertaining, while at the same time making a powerful case for why all of us need to
know more and think harder about the (cyber)world we know live in.“
—Anne-Marie Slaughter, President, the New America Foundation
“Singer and Friedman blend a wonderfully easy to follow FAQ format with engaging
prose, weaving explanations of the elements of cybersecurity with revealing anecdotes.
From the fundamentals of Internet architecture to the topical intrigue of recent security
leaks, this book provides an accessible and enjoyable analysis of the current cybersecurity
landscape and what it could look like in the future.”
—Jonathan Zittrain, Professor of Law and Professor of Computer
Science at Harvard University, and author of The Future of the
Internet—And How to Stop It
“Singer and Friedman do a highly credible job of documenting the present and likely
future risky state of cyber-affairs. This is a clarion call.”
—Vint Cerf, “Father of the Internet,” Presidential Medal of Freedom winner
“I loved this book. Wow. Until I read this astonishing and important book, I didn’t know
how much I didn’t know about the hidden world of cybersecurity and cyberwar. Singer
and Friedman make comprehensible an impossibly complex subject, and expose the
frightening truth of just how vulnerable we are. Understanding these often-invisible
threats to our personal and national security is a necessary fi rst step toward defending
ourselves against them. This is an essential read.”
—Howard Gordon, Executive Producer of 24 and co-creator of Homeland
oxfordhb-9780199918096.indd iioxfordhb-9780199918096.indd ii 21-10-2013 22:38:1321-10-2.
Discovering Credible Events in Near Real Time from Social Media StreamsCody Buntain
My proposed research addresses fundamental deficiencies in social media-based event detection by discovering high-impact moments and evaluating their credibility rapidly.
Results from my preliminary work demonstrate one can discover compelling moments by leveraging machine learning to characterize and detect bursts in keyword usage.
Though this early work focused primarily on language-agnostic discovery in sporting events, it also showed promising results in adapting this work to earthquake detection.
My dissertation will extend this research by adapting models to other types of high-impact events, exploring events with different temporal granularities, and finding methods to connect contextually related events into timelines.
To ensure applicability of this research, I will also port these event discovery algorithms to stream processing platforms and evaluate their performance in the real-time context.
To address issues of trust, my dissertation will also include developing algorithms that integrate the vast array of social media features to evaluate information credibility in near real time.
Such features include structural signatures of information dissemination, the location from which a social media message was posted relative to the location of the event it describes, and metadata from related multimedia (e.g., pictures and video) shared about the event.
My preliminary work also suggests methods that could be applied to social networks for stimulating trustworthy behavior and enhancing information quality.
Contributions from my dissertation will primarily be practical algorithms for discovering events from various social media streams and algorithms for evaluating and enhancing the credibility of these events in near real time.
PS - Thanks to everyone who attended the PhD Symposium and provided feedback!
Everyone seems to think that Big Social has made privacy a thing of the past. Think again. It's a human right and it's on the Endangered Species list, but there are ways to save it. Find out how.
The lord of the rings and information security in your open source projectAmye Scavarda Perrin
From time to time, communities will run across information security incidents. In the course of project expansion, it always seems like a good idea to wake up a new instance of Something_With_A_Database and not write down the credentials or think very clearly about what the permissions are on that new instance. If you’re involved in open source for any length of time, you’re going to discover a hack at some point in time. However, the Lord of the Rings is a great model for being able to deal with your information security issues.
Michele needs to find tech companies to invite them over as speakers at next Speck&Tech events. He can do it easily, just by using Atoka!
Atoka is a B2B lead-generation service, containing highly detailed information about companies from official (e.g., national company registers) and unofficial (e.g., the website of a company) sources. Atoka is used by thousands of small and big companies in Italy and abroad.
Next to Atoka, SpazioDati works on applying Semantic Text Analysis and Machine Learning models on massive amounts of corporate data to provide services - both B2B and B2C - of Sales Intelligence, Lead Generation, Data Cleansing, and more.
We are looking for software developers that are ready to “get their hands dirty” for building a better world (of data, at least), where information is clean and easily accessible. We are a multicultural team that loves collaboration, we are “agile enough” and, hard to believe, we all love data.
Check out more: www.spaziodati.eu/en/jobs
Since its initial conception on 1 March 2016, the purpose of Speck&Tech has always been clear and straightforward: creating a “community of entrepreneurs, developers, designers, professionals and anyone who wants to build a network of tech enthusiasts within the Trento area, with the purpose of learning and sharing new ideas regarding development, design, entrepreneurship, startups and any related topic”.
3.5 years, 40+ events and thousands of “speckers” later, we are still pursuing that mission - and we believe we are on the right path. We warmly invite all of you to actively contribute and give back to our unique community, so to help us reach this goal, and make Trentino even better.
Since its initial conception on 1 March 2016, the purpose of Speck&Tech has always been clear and straightforward: creating a “community of entrepreneurs, developers, designers, professionals and anyone who wants to build a network of tech enthusiasts within the Trento area, with the purpose of learning and sharing new ideas regarding development, design, entrepreneurship, startups and any related topic”.
2.5 years, 30+ events and thousands of “speckers” later, we are still pursuing that mission - and we believe we are on the right path. We warmly invite all of you to actively contribute and give back to our unique community, so to help us reach this goal, and make Trentino even better.
The Club Alpbach Trentino organized, with the support of the European Commission in Italy, a conference for students, academics and professionals. During this event the challenges and opportunities for the creation of a European digital single market will be discussed, which is one of the 10 political priorities the European Commission has defined for the 2015-2019 five-year period.
The discussion will address, in two panels, two sides of this question: in the Data Economy panel, the entrepreneurial opportunities and the possible evolutions of the digital economy within a single European market; in the Data Policies panel, the regulatory challenges and integrations of the digital economy among Member States in terms of data protection, consumer protection, antitrust law and data portability.
Institutional greetings and introduction - with Chiara Maule (Councilor for innovation of the Municipality of Trento)
Panels:
- Data Economy: Stefano Bernardi (Token Economy), Bruno Lepri (FBK), Michele Barbera (Spaziodati), Lara Kersbamer (Almamobile); moderator: Francesco Bonadiman (EIT Digital).
- Data Policies: Monika Nardo (European Consumer Center), Simonetta Vezzoso (Unitn); Maurizio Napolitano (FBK); Giorgia Lodi (Agency for Italia Digitale); moderator: Cristina Pozzi (Author)
BenVeneto è una proposta che abbiamo progettato e presentato ad H-ACK WINE, una maratona di progettazione promossa da H-Farm, durante la quale designer, architetti ed esperti di comunicazione e di food&wine si sono sfidati per sviluppare un concept creativo per lo stand della Regione Veneto al Vinitaly 2018.
I created this pack of slides to lead a workshop on Design Thinking - mostly problem identification and solution generation - for the "URBAN DATA SCIENCE BOOTCAMP", a professional school crash-course on how the science of urban data can be applied to solve metropolitan issues. The course was held both in Milan and Amsterdam.
Feel free to contact me to know more, or invite me over to run it.
This course was organized for the CrowdInsights project (crowdinsights.eu), though my workshop and its slides are being continuously edited and improved (tested already 5-6 times on university and high school students, and adults from both public and private sectors).
"EYECITY, un progetto di piattaforma gestionale di integrazione per il comune di MI per l’analisi in tempo reale dei dati raccolti dai sensori per creare previsioni in supporto al decision making tramite data analytics e predictive learning."
The EIT Alumni Startup Days bring together graduates, researchers, developers, designers, young professionals, entrepreneurs, and start-up enthusiasts under one roof, over a weekend to share ideas, form teams, build future products and services, and embark on new entrepreneurial adventures.
The EIT Alumni Startup Days is a non-profit event, and all income from the participation fees is 100% re-invested into the event.
"FrancigenR" is a native iOS mobile application which allows users to plan their trip on the Via Francigena by choosing the POIs suggested according to their profiles (updated through gamification) and to meet like-minded people they might travel with. We developed and presented this app at the HackathonBiz in Milan, organized by Uvet and Talent Garden on November, 15-16th, and we won the final prize consisting of 5K€. Demo-video: https://youtu.be/2znzGyEJIb8
HutteBot is a Telegram bot we (Francesco Bonadiman, Luca Galasso, Massimiliano Bolognesi and Silvio Biasiol) developed for the Hackathon.bz.it.
By using public transport and mountain cabins APIs, and by combining them with OpenStreetMaps and GoogleMaps ones, we created this bot which (ideally) allows users to:
- view mountain cabins within your area
- choose those ones you want to reach via Smart Mobility
- sort and filter cabins according to different parameters
- view cards of the cabins with info, maps and itineraries.
Get in touch with us in case you are interested to develop a Telegram bot ;)
DwesaBot is a light and powerful local guide for South Africans living in the Dwesa region. It comes as a chatbot for Telegram and it allows users to share journeys, check for springs nearby and report new ones (with their quality), share local food with people nearby and report accidents and road disruptions. It also promotes open-data usage and transparency for the Government, since it allows citizens to verify the location of water springs, together with their quality and queue, and to report illegal dumping sites.
Luca, Massimiliano, Silvio and I participated in the IEEE ISC2 Hackathon, organized by IEEE, EIT Digital and FBK and held in Trento on September, 13-14th, and we won both the Track prize and the final one, for a total amount of 5K euros. We are now redesigning and further developing the bot together with the ICT4G Unit of FBK, in order to launch a more complete version of the bot within the year.
Enhancing the interaction space of a tabletop computing system to design pape...Francesco Bonadiman
This is the presentation of my Master Thesis, which presents new low-tech interaction techniques developed to enhance the user interaction in tabletop computing environments. These low-tech approaches, indeed, aim at creating a valuable alternative to high-tech solutions, which instead focus their interaction on computer and mobile devices. Electronic tools, in fact, tend to distract the users and disturb the creative design process when working with low-tech methods within tabletop-based environments. The new interaction techniques were designed, implemented and finally applied to a tabletop computing system conceived to enhance paper-prototyping for mobile devices. This way, designers do not need to continuously shift the fidelity of the media they are working with and are able to perform a number of different actions on the paper sketches (like editing or duplicating screens) by only using low-tech solutions. Therefore, these interaction techniques are evaluated with users to assess how fast or mentally demanding they are and which of the developed approaches is preferred.
Enhancing the interaction space of a tabletop computing system to design pape...Francesco Bonadiman
This Master Thesis presents new low-tech interaction techniques developed to enhance the user interaction in tabletop computing environments. These low-tech approaches, indeed, aim at creating a valuable alternative to high-tech solutions, which instead focus their interaction on computer and mobile devices. Electronic tools, in fact, tend to distract the users and disturb the creative design process when working with low-tech methods within tabletop-based environments. The new interaction techniques were designed, implemented and finally applied to a tabletop computing system conceived to enhance paper-prototyping for mobile devices. This way, designers do not need to continuously shift the fidelity of the media they are working with and are able to perform a number of different actions on the paper sketches (like editing or duplicating screens) by only using low-tech solutions. Therefore, these interaction techniques are evaluated with users to assess how fast or mentally demanding they are and which of the developed approaches is preferred.
A tabletop system to paper-prototype for mobile applicationsFrancesco Bonadiman
Technology has extremely changed in recent times; for example, desktop and laptop computers are being replaced by smartphones, tablets and smartwatches in everyday life. However, this change is not being reflected on the way UI prototypes are generated. Viewing this problem from an I&E perspective gives us a clearer idea of what this can mean: there are no adequate tools to effectively paper-prototype for mobile devices.
In order to solve this problem, I am currently working at Telekom Innovation Laboratories on my Master Thesis Project, which is about ways to improve the user interaction with a tabletop computing system designed to paper-prototype for mobile devices. Thus, in this thesis, I am going to perform both a market and a competitor analysis for the environment which my Major Thesis is based on. Afterwards, I will illustrate the business idea and explain the value proposition that differentiates my solution from the other products listed in the Competitor Analysis, proving how my proposal should take advantage of the market differentiation. Finally, I will describe the initial steps of the business idea itself, explaining the reasons of the chosen target and introducing an initial pricing strategy for the product. I will conclude this Minor Thesis work by presenting my contributions to the Master Thesis Project.
In this presentation we are going to talk about Privacy and Ethical issues in Biometric Systems, a really important topic about which there have been many discussions especially in the last 15 years. But, despite some enthusiastic views, things haven’t changed so much since the early 2000s.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
1. The right to be
forgotten
Francesco Bonadiman
franzbona@hotmail.it
Craig Kershaw
ckismuk@gmail.com
15 January 2015
Quality and Usability (Privacy) Seminar
35. Previous Legislation
Directive 95/46/EC → Internet protection
“Right to forget” → don’t revive old events
French Code → criminals
“droit à l’oubli” + rehab
falkondigital.com
22
36. Previous Legislation
Directive 95/46/EC → Internet protection
“Right to forget” → don’t revive old events
French Code → criminals
“droit à l’oubli” + rehab
ECHR: balance between
Privacy ⇔ Right to speech falkondigital.com
22
75. Conclusions
Convergence in views between US and EU
Balance privacy ⇔ freedom
Trade-off sharing ⇔ services
Internet → Free and open as now? imageshack.us
35
80. References
1. Bygrave L., A right to be forgotten?, Communications of the ACM, 2015
2. Ausloos J., The ‘Right to be Forgotten’ - Worth Remembering?, Forthcoming Computer Law
& Security Review, 2012
3. de Terwangne. C, Internet Privacy and the Right to Be Forgotten/Right to Oblivion, Revista de
los Estudios de Derecho y Ciencia Política de la UOC, 2012
4. Wagner M., Li-Reilly Y., The right to be forgotten, The Advocate, 2014
5. Weber R., The Right to Be Forgotten: More Than a Pandora’s Box?, JIPITEC, 2011
6. Bennett S., The "Right to Be Forgotten": Reconciling EU and US Perspectives, Berkeley Journal
of International Law, 2012
7. Rosen J., The Right to Be Forgotten, Stanford Law Review, 2012
8. wsj.com/articles/eu-says-google-should-extend-right-to-be-forgotten-to-com-websites-
1417006254 - The Wall Street Journal
9. theguardian.com/technology/2014/nov/27/eu-to-google-expand-right-to-be-forgotten-
to-googlecom - The Guardian
10. wikipedia.org/wiki/Right_to_be_forgotten - Wikipedia
39
81. Discussion
Might forgetting be a good thing?
And if yes, after how long?
Should ISP determine whether a piece of
information should be forgotten?
40