1. Last 7 days
    1. Priznaju se normirani troškovi

      Test 2.0

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

  2. Apr 2021
    1. The firing of top Google AI ethics researchers has created a significant backlash

      maybe interesting for ||sorina|| and ||MariliaM||||sorina.teleanu||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. the digital equivalent of bussing in a fake crowd for a speech.

      is it?

    2. acted quickly

      acting quick in some countries not so much in others

    3. Facebook has repeatedly allowed world leaders and politicians to use its platform to deceive the public or harass opponents despite being alerted to evidence of the wrongdoing.

      very strong claim. Worth following up? for dig.watch ||Katarina_An|| ||AndrijanaG|| Also content policy / socio-ecoomic basket ||GingerP||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Mobileye is developing two completely independent self-driving systems—one driven by cameras and the other by a combination of lidar and radar. Once each of these systems has achieved a high level of performance separately, Mobileye will combine them into a single system. Mobileye believes this extra layer of redundancy will give the company higher confidence in the safety of its systems

      new approach to developing self-driving tech

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. the Stanford Encyclopedia of Philosophy

      Excellent resource!!!

    2. there were between fifty and seventy types of argumentation that could be applied to just about every possible debate question.

      Can we find more resources about it? This could be interesting for Speech Generator and way how countries frame cybersecurity argument.

      ||VladaR||||AndrijanaG||||JovanNj||

    3. The young machine learned by scanning the electronic library of LexisNexis Academic, composed of news stories and academic journal articles—a vast account of the details of human experience.

      Shall we rely more on Lexis Nexis for input of articles via JovanNJ search

      ||NatasaPerucica|| Could you check subscription info

      ||Katarina_An||||JovanNj||

    4. Debate is a game, like trivia or chess, in that it has specific rules and structures, which can be codified and taught to a machine.

      it is interesting how far rules can be applied to dealing with complex problems such as debating?

    5. Tel Aviv

      It is in Haifa

    6. ||Jovan|| I think this article is interesting for you because it deals with AI and politics

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Yet doom-mongers struggle to point to actual evidence of accelerating automation.

      Little evidence that there is an accelerated automation of work (including in the pandemic context).

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

  3. Mar 2021
    1. We must move away from a culture of individualism toward the restoration of a common good.

      Also Internet as a public common good? ||Jovan||||Pavlina||||StephanieBP||

    2. If the pandemic revealed our global web of mutuality, how can we better support leaders on the ground, connect across countries and continents, and rebuild multilaterally?

      Supporting leaders on the ground to connect. Rebuild multilateralism. ||Jovan||||Pavlina||

    3. we must not--return to our old ways of working, learning, and connecting

      FF narrative: Looking forward on new ways of working and learning and connecting. ||Katarina_An||||Jovan||||Pavlina||

    4. Now it’s clear that we are not just interconnected but also deeply interdependent.

      Basis for Ford Foundation narrative for the future. ||Pavlina||||Jovan||||VladaR||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. States concludedthat there are potentially devastating security, economic, social and humanitarian consequences of malicious ICT activitieson critical infrastructure (CI) and critical information infrastructure (CII) supporting essential services to the public. While it is each State’s prerogative to determine which infrastructures it designates ascritical, such infrastructure may include medical facilities,

      While the applicability of humanitarian law is not included in the final report, there are several references to humanitarian aspects of malicious activities - CI including medical facilities, recognising humanitarian consequences.

    2. The OEWG welcomes the high level of participation of women delegates in its sessions and the prominence of gender perspectives in its discussions.

      Gender balance in cybersecurity was one of the discussion topics during the 3rd substantial OEWG session. Increased participation of women was specifically recognised. Gender balance is also reflected in capacity building section below.

    3. including the possibility of additional legally binding obligations.

      This was pushed in by China, though opposed by the West. Additional legally binding obligations most likely refer to a possible future Code of Conduct/global treaty (as proposed by the Shanghai Cooperation Organisation earlier)

    4. Programme of Action should be further elaborated including atthe Open-Ended Working Group

      While this gives 'mandate' to OEWG to discuss PoA, it doesn't limit the options of running the PoA through other venues ("including at") - GA, First Committee, GGE report, or other. One can expect, however, that PoA will be among first elements of the OEWG2 agenda.

    5. support the capacities of States in implementing commitments in their use of ICTs, in particular the Programme of Action

      PoA is framed in context of support with the capacities of states in implementations. PoA is, however, envisaged as a possible single process to replace other processes in terms of institutional dialogue - as a continuous process (https://dig.watch/updates/france-and-partners-propose-programme-action-advancing-responsible-state-behaviour) This framing is not helping with this.

    6. ensure the continuation of the inclusive and transparent negotiation process

      Important element is the transparency and inclusiveness. Even if it is not explicit about the involvement of non-state stakeholders, transparency is rather clear here (one of the main remarks to the GGE work, besides being for a limited number of states, was its confidentiality and lack of transparency).

    7. of other issues.7

      It was removed in the final round: "including terrorism, crime, development, human rights and Internet governance."

      This is a continuous 'battle' on what the OEWG (ie UN institutional dialogue) talk and not talk about - in particular whether cybercrime should be included, and that it should (not) address Internet governance aspects such as content policy, or ICANN-related issues.

    8. Some non-State actors have demonstrated ICT capabilities previously only available to States

      This is interesting: attribution to states was always contested. Yet here, we hear that non-states have capabilities that states have… yet we don't know what states have due to lack of transparency.

    9. The OEWG recognizes the importance and complementarity of specialized discussions on aspects of digital technologies addressed by other UN bodies and fora

      This may, in particular, refer to the UN digital cooperation track as well as the IGF, but also the 'digital elements' of the SDG process

    10. general availability or integrity of the Internet,

      Indirect reference to the call by the Global Commission on Stability of Cyberspace (GCSC) for the protection of the Public Core of the Internet: https://cyberstability.org/research/call-to-protect/ GCSC defines the public core to include packet routing and forwarding (thus routing protocols), naming and numbering system (thus ICANN and IANA work), cryptographic mechanisms of security and identity (including DNSSec and similar protocols), and physical transmission media (including submarine cables): https://cyberstability.org/wp-content/uploads/2018/07/Definition-of-the-Public-Core-of-the-Internet.pdf

      Here, only a mention of 'general availibility and integrity of the Internet' was included, but this is a step forward. It is also mentioned in par. 26 under Norms, which is even more relevant.

    11. The continuing increase in incidents involving the malicious use of ICTs by State and non-State actors, including terrorists and criminal groups,is a disturbing trend

      It is pity this language has not been stronger, and more explicit. In particular, exploiting vulnerabilities should have been explicitly mentioned as 'disturbing' - if not condemned (having in mind SolarWinds and other examples).

      Exploiting a vulnerability against one system discloses the vulnerability of a whole classes of commercial systems to the broader public. This then ends up being exploited by criminals against other such systems around the world, thereby weakening the entire cyberspace.

      While it may be understood to fall under "malicious use of ICT", it is important to clearly spell it out.

    12. Conclusions and recommendations

      In addition to the conclusions and recommendations, the discussion section of the draft is now included in Chair's Summary - meant to be a rich resource of issues to be discussed in the future.

    13. Building on this foundationand reaffirming this framework

      The states reaffirmed the acquis of previous GGE reports, THE achievement of the Final report.

    14. The current global health crisis

      How strong is link between pandemic crisis and cybersecurity in the OEWG report?

    15. The current global health crisis

      How strong is link between pandemic crisis and cybersecurity in the OEWG report?

    16. Malicious ICT activitiesagainst CIand CII that undermine trust and confidence in political and electoral processes, public institutions,or that impact the general availability or integrity of the Internet, are also a real and growing concern

      While the principle of the state sovereignty did not make it into the final report, the text now includes recognition of malicious activities undermining political and electoral processes, and public institutions the essential elements of state sovereignty.

      The recognition of public core of internet has not been included, but the general availability and integrity of internet moves the needle closer to the possible recognition.

      Both of these changes reflect the discussions in the 3rd substantial OEWG session and mirror the careful balance between the requests of delegations.

    17. Conclusions and recommendations

      In addition to the conclusions and recommendations, the discussion section of the draft is now included in Chair's Summary - meant to be a rich resource of issues to be discussed in the future.

    18. high level of participation of women delegates

      Gender balance in cybersecurity was one of the discussion topics during the 3rd substantial OEWG session. Increased participation of women was specifically recognised. Gender balance is also reflected in capacity building section below.

    19. Building on this foundationand reaffirming this framework,

      The states reaffirmed the acquis of previous GGE reports, THE achievement of the Final report.

    20. humanitarian consequences of malicious ICT activities

      The report references humanitarian impacts of malicious cyber activities in several instances, but does not recognise the applicability of international humanitarian law.

    21. The continuing increase in incidents involving the malicious use of ICTs by State and non-State actors, including terrorists and criminal groups,is a disturbing trend.

      It is pity this language has not been stronger, and more explicit. In particular, exploiting vulnerabilities should have been explicitly mentioned as 'disturbing' - if not condemned (having in mind SolarWinds and other examples).

      Exploiting a vulnerability against one system discloses the vulnerability of a whole classes of commercial systems to the broader public. This then ends up being exploited by criminals against other such systems around the world, thereby weakening the entire cyberspace.

      While it may be understood to fall under "malicious use of ICT", it is important to clearly spell it out.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. While International Geneva continued to host face-to-face peace talks for war-torn countries like Syria

      test

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

  4. Feb 2021
    1. f the widespread use of cloud computing, we started to move our digital assets (e.g. text files, personal data, spreadsheets, e-mail, and, to some extent, software applications) from our computer h

      Test annotation to check different groups

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Diplo LMS

      Test 12345

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

  5. Jan 2021
    1. ill use it to post re

      Test 12345

    2. Following our approach to look at the relationships between technology and policy, we will also analyse how Internet protocols contribute to the achievement of core Internet principles. Each week, you should be able to connect more of the dots between technologies and principles. Please rai

      dusan test

    3. among

      test12345

    4. module

      Dusan Test

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL