Charles Mok discusses various threats facing the internet, including digital repression, surveillance, misinformation, internet shutdowns, and data/cyber sovereignty. He notes that data, standards, infrastructure, and values are fragmenting. Regulatory fragmentation is also occurring as democracies seek backdoors, while authoritarians view cybersecurity as a means of regime security and push for more government control over internet governance through conferences like the World Internet Conference. Overall, Mok argues the vision of "One World, One Internet" is under threat from increasing fragmentation across many areas.
Internet of Things, Various Names, One Concept, History of IoT, Applications of IoT, Challenges and Barriers in IoT, Internet Revolution, Future of IoT, Impact of the Internet, Internet Usage and Population Statistics
The presentation of a public hearing of the European Parliament in Brussels, Belgium in 2018. Expert witness Lars Hilse was heard on the risks of cyber terrorism against critical infrastructure and public places.
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT SecurityPro Mrkt
Dr Alisdair Ritchie from the WMG, University of Warwick is taking us through his research on IoT security at the Midlands Cyber Security Expo 2019 #midscybersecurity19
Cybersecurity Strategies - time for the next generationHinne Hettema
In this talk, presented in June 2016 at KAIST, I argue that it is time for the next generation of cybersecurity strategies. These must have a governance focus, and be based on international laws, declarations and agreements, basic internet rights and public good provisions.
Internet of Things, Various Names, One Concept, History of IoT, Applications of IoT, Challenges and Barriers in IoT, Internet Revolution, Future of IoT, Impact of the Internet, Internet Usage and Population Statistics
The presentation of a public hearing of the European Parliament in Brussels, Belgium in 2018. Expert witness Lars Hilse was heard on the risks of cyber terrorism against critical infrastructure and public places.
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT SecurityPro Mrkt
Dr Alisdair Ritchie from the WMG, University of Warwick is taking us through his research on IoT security at the Midlands Cyber Security Expo 2019 #midscybersecurity19
Cybersecurity Strategies - time for the next generationHinne Hettema
In this talk, presented in June 2016 at KAIST, I argue that it is time for the next generation of cybersecurity strategies. These must have a governance focus, and be based on international laws, declarations and agreements, basic internet rights and public good provisions.
Global Governance of Generative AI: The Right Way ForwardLilian Edwards
AI regulation has been a hot topic since the rise of machine learning (ML) in the “big data” era, but generative AI or “foundation models” tools like ChatGPT, DALL-E 2(now 3) and CoPilot, ike ML before them, may create serious societal risks, including embedding and outputting bias; generating fake news, illegal or harmful content and inadvertent “hallucinations”; infringing existing laws relating eg to copyright and privacy; as well as environmental, competition and workplace concerns.
Many nations are now considering regulation to address these worries, and can draw on a number of basic and hybrid models of governance. This paper canvasses models of mandatory comprehensive legislation (where the EU AI Act hopes to place itself as a gold standard model); vertical mandatory legislation (where China has quietly taken a lead); adapting existing law (see the many copyright lawsuits underway); and voluntary “soft law” such as codes of ethics, “blueprints”, or industry guidelines. Both the domestic and international regulatory scenes for AI are also increasingly politicised as the rise of "AI safety" hype shows. Against this backdrop what choices should smaller countries such as the UK and Australia make? will international harmonisation lead to a race to the top as with the GDPR, or the bottom - rule by tech for tech?
a quick primer on the Internet of Things.
this presentation was a guest lecture for students to get a quick introduction to the Internet of Things, see some live demos and experiment with Evothings Studio, Arduino and their iOS devices at Hyper Island in Stockholm, Sweden.
All The Things: Security, Privacy & Safety in a World of Connected DevicesJohn D. Johnson
Much of our technology today is connected to the Internet and communicating information about us, our homes and businesses, back to manufacturers in order to give us something of value in return. It is estimated that by 2025, there may be as many as 80 billion Internet of Things (IoT) devices connected to the Internet. As IoT becomes a normal part of our everyday lives, at home, on the road, and at the office, privacy, security and safety become paramount.
This presentation will set the stage: What is IoT? How is it used today? How will it be used in the future? IoT provides both opportunities and risk to society, and IoT devices need to be secured as this world of connected devices become critical to how society functions.
How Can Policymakers and Regulators Better Engage the Internet of Things? Mercatus Center
The world today is seemingly always plugged into the Internet and technologies are constantly sharing data about our personal and professional lives. Device connectivity is on an upward trend with Cisco estimating that 50 billion devices will be connected to the Internet by 2020. Collection and data sharing by these devices introduces a host of new vulnerabilities, raising concerns about safety, security, and privacy for policymakers and regulators.
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...Adam Thierer
"Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Driven Innovation." A presentation by Adam Thierer (Mercatus Center at George Mason University) made on September 11, 2014 at AEI-FCC Conference on "Regulating the Evolving Broadband Ecosystem."
IoT-Where is the Money? - Chandrashekar Raman, Engagement Manager, IoT Strate...Lounge47
“Internet of Things (IoT) – Where is the Money?” - This talk highlighted the need for innovative business and technical models. Top 5 key takeaways from the session: 1) Analyze business models from the perspective of targeting “control points” (allows disproportionate share of value e.g. platform), “network externalities” (users generate more users e.g. facebook) and “virtuous cycle” (self-propogating value system e.g. Twitter: tweets generating more, value, tweeters and users) 2) Fog computing (solutions at the edge of the network) should be considered for "time sensitive" or "mission critical" solutions 3) IoT Stats 2013: $1.7B funding, 186 deals, 30% up YOY, 75% up on exits, largely in platforms; Cisco estimates 50B connected devices by 2020, economic value of 19 trillion added in next decade 4) Manufacturing and Smart Cities most immediate opportunities in Enterprise space 5) Key Challenges are security and time-sensitive networking. In summary, IoT Startups focused in a hot space need to pick clever business models relative to the competition.
Protection mechanism and collaborations among public and private sectors to enhanced cybersecurity of the information network and to protect privacy and civil liberties of citizens in the digital age.
Panel discussion on “Learn from the Giants, How They Lift Cybersecurity and Privacy Obstacles”
Digital Thailand 2016 conference, Bangkok, 27 May 2016
Discussed by @bact Arthit Suriyawongkul
QUT Regulating Disinformation with AI Marsden 2024Chris Marsden
“It is the ‘AI regulation moment” intoned the Secretary General of both the International Telecommunications Union (ITU) and the United Nations itself, before the UN General Assembly passed a unanimous resolution on AI safety, and the G7 Hiroshima Dialogue of AI codes of conduct moved industrialised nations beyond self-regulation. Academic analysts and policymakers need to challenge a reversion to broken models, to ethics washing and to what is now being termed ‘AI washing’. I set out a critical agenda for remembering lessons from the Internet past to assert an AI co-regulatory future.
The technology industry is evolving in ways we never imagined. The latest trends and devices in the marketplace are not only improving and influencing our daily lives, but becoming a part of it. ITA’s Exploring the Internet of Things Summit will shed a light on the evolution of technology and what’s to come in the future.
Join us for the summit on Thursday, November 20.
See full details at illinoistech.org/internetofthings
The Convergence of IT, Operational Technology and the Internet of Things (IoT)Jackson Shaw
Did you know that today, there are over 30 billion connected IoT devices? And that in 2020, that number will double? Do you know how these devices connect to the internet? To each other? To their manufacturer? How many IoT devices are used within your company? If you’re a security professional you’ll need to be able to answer these questions and more. In this session, Jackson Shaw (Dell) will discuss the convergence (collision?) of IoT with IT and OT, what it means to him as a consumer and what it means to us as identity and IT security professionals.
Keynote presentation at European Identity Conference 2015, Munich, Germany.
https://www.id-conf.com/eic2015
Global Governance of Generative AI: The Right Way ForwardLilian Edwards
AI regulation has been a hot topic since the rise of machine learning (ML) in the “big data” era, but generative AI or “foundation models” tools like ChatGPT, DALL-E 2(now 3) and CoPilot, ike ML before them, may create serious societal risks, including embedding and outputting bias; generating fake news, illegal or harmful content and inadvertent “hallucinations”; infringing existing laws relating eg to copyright and privacy; as well as environmental, competition and workplace concerns.
Many nations are now considering regulation to address these worries, and can draw on a number of basic and hybrid models of governance. This paper canvasses models of mandatory comprehensive legislation (where the EU AI Act hopes to place itself as a gold standard model); vertical mandatory legislation (where China has quietly taken a lead); adapting existing law (see the many copyright lawsuits underway); and voluntary “soft law” such as codes of ethics, “blueprints”, or industry guidelines. Both the domestic and international regulatory scenes for AI are also increasingly politicised as the rise of "AI safety" hype shows. Against this backdrop what choices should smaller countries such as the UK and Australia make? will international harmonisation lead to a race to the top as with the GDPR, or the bottom - rule by tech for tech?
a quick primer on the Internet of Things.
this presentation was a guest lecture for students to get a quick introduction to the Internet of Things, see some live demos and experiment with Evothings Studio, Arduino and their iOS devices at Hyper Island in Stockholm, Sweden.
All The Things: Security, Privacy & Safety in a World of Connected DevicesJohn D. Johnson
Much of our technology today is connected to the Internet and communicating information about us, our homes and businesses, back to manufacturers in order to give us something of value in return. It is estimated that by 2025, there may be as many as 80 billion Internet of Things (IoT) devices connected to the Internet. As IoT becomes a normal part of our everyday lives, at home, on the road, and at the office, privacy, security and safety become paramount.
This presentation will set the stage: What is IoT? How is it used today? How will it be used in the future? IoT provides both opportunities and risk to society, and IoT devices need to be secured as this world of connected devices become critical to how society functions.
How Can Policymakers and Regulators Better Engage the Internet of Things? Mercatus Center
The world today is seemingly always plugged into the Internet and technologies are constantly sharing data about our personal and professional lives. Device connectivity is on an upward trend with Cisco estimating that 50 billion devices will be connected to the Internet by 2020. Collection and data sharing by these devices introduces a host of new vulnerabilities, raising concerns about safety, security, and privacy for policymakers and regulators.
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...Adam Thierer
"Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Driven Innovation." A presentation by Adam Thierer (Mercatus Center at George Mason University) made on September 11, 2014 at AEI-FCC Conference on "Regulating the Evolving Broadband Ecosystem."
IoT-Where is the Money? - Chandrashekar Raman, Engagement Manager, IoT Strate...Lounge47
“Internet of Things (IoT) – Where is the Money?” - This talk highlighted the need for innovative business and technical models. Top 5 key takeaways from the session: 1) Analyze business models from the perspective of targeting “control points” (allows disproportionate share of value e.g. platform), “network externalities” (users generate more users e.g. facebook) and “virtuous cycle” (self-propogating value system e.g. Twitter: tweets generating more, value, tweeters and users) 2) Fog computing (solutions at the edge of the network) should be considered for "time sensitive" or "mission critical" solutions 3) IoT Stats 2013: $1.7B funding, 186 deals, 30% up YOY, 75% up on exits, largely in platforms; Cisco estimates 50B connected devices by 2020, economic value of 19 trillion added in next decade 4) Manufacturing and Smart Cities most immediate opportunities in Enterprise space 5) Key Challenges are security and time-sensitive networking. In summary, IoT Startups focused in a hot space need to pick clever business models relative to the competition.
Protection mechanism and collaborations among public and private sectors to enhanced cybersecurity of the information network and to protect privacy and civil liberties of citizens in the digital age.
Panel discussion on “Learn from the Giants, How They Lift Cybersecurity and Privacy Obstacles”
Digital Thailand 2016 conference, Bangkok, 27 May 2016
Discussed by @bact Arthit Suriyawongkul
QUT Regulating Disinformation with AI Marsden 2024Chris Marsden
“It is the ‘AI regulation moment” intoned the Secretary General of both the International Telecommunications Union (ITU) and the United Nations itself, before the UN General Assembly passed a unanimous resolution on AI safety, and the G7 Hiroshima Dialogue of AI codes of conduct moved industrialised nations beyond self-regulation. Academic analysts and policymakers need to challenge a reversion to broken models, to ethics washing and to what is now being termed ‘AI washing’. I set out a critical agenda for remembering lessons from the Internet past to assert an AI co-regulatory future.
The technology industry is evolving in ways we never imagined. The latest trends and devices in the marketplace are not only improving and influencing our daily lives, but becoming a part of it. ITA’s Exploring the Internet of Things Summit will shed a light on the evolution of technology and what’s to come in the future.
Join us for the summit on Thursday, November 20.
See full details at illinoistech.org/internetofthings
The Convergence of IT, Operational Technology and the Internet of Things (IoT)Jackson Shaw
Did you know that today, there are over 30 billion connected IoT devices? And that in 2020, that number will double? Do you know how these devices connect to the internet? To each other? To their manufacturer? How many IoT devices are used within your company? If you’re a security professional you’ll need to be able to answer these questions and more. In this session, Jackson Shaw (Dell) will discuss the convergence (collision?) of IoT with IT and OT, what it means to him as a consumer and what it means to us as identity and IT security professionals.
Keynote presentation at European Identity Conference 2015, Munich, Germany.
https://www.id-conf.com/eic2015
ICANN TWNIC TWIGF 2023: Compliance through CompulsionCharles Mok
Compliance through Compulsion: The trend and impact of access restriction becoming a policy tool for compliance
ICANN-APAC TWNIC Engagement Forum 2023 / TWIGF
全球數位威權趨勢及對台灣的挑戰和機遇
Digital Authoritarianism: Global Trends, Challenges and Opportunities for Taiwan
Keynote for Open Culture Foundation
April 8 2023
Taipei, Taiwan
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
ER(Entity Relationship) Diagram for online shopping - TAEHimani415946
https://bit.ly/3KACoyV
The ER diagram for the project is the foundation for the building of the database of the project. The properties, datatypes, and attributes are defined by the ER diagram.
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
1. Charles Mok | Internet Society | July 26 2023
Threats to the Internet
2. My brief background
A “multi-roles” stakeholder’s view
• Technical engineering background
• ISP entrepreneur
• Trade associations and civil
society (ISOC HK co-founder)
• Legislator
• Academia (Stanford Cyber Policy
Center)
• ISOC Trustee
• https://www.linkedin.com/in/charlesmok/
3. Threats to the Internet?
• Digital repression
• Surveillance & privacy protection
• Misinformation & disinformation
• Internet shutdowns
• Digital sovereignty
• Cybersecurity
• AI
• The Internet meets geopolitics
13. Values fragmentation
World Internet Conference — China and friends
• Extending the Digital Silk
Road
• “Internationalization” of
Internet governance?
• “Cyberspace”
governance?
14. The authoritarians’ view of Internet governance?
Cybersecurity = Regime security
• China’s top diplomat has called for “fairness and
justice” in cyberspace, urging emerging economies
to jointly oppose all attempts at scienti
fi
c,
technological or internet dominance, and prevent
the web from being used to foment military
one-upmanship or “colour revolutions”.
• The meeting on cybersecurity included delegates
from Brazil, Russia, India, China and South Africa,
the emerging markets giving the informal bloc its
name. Representatives of several other countries
also attended, including Belarus, Iran, Saudi Arabia,
the United Arab Emirates, Kazakhstan, Egypt,
Burundi and Cuba.
15. Charles Mok
Visiting Scholar, Global Digital Policy
Incubator, Cyber Policy Center, Stanford
University
Trustee, Internet Society