21 Matching Annotations
  1. Nov 2022
    1. TITLE: Disrupting Harm Research Project generates and archives new evidence on how digital technology facilitates the sexual exploitation and abuse of children.

      CONTENT: This resource page consists of evidence on online child sexual exploitation and abuse at national and regional levels, which helps us to better understand the disrupting situations of abuse and exploitation in developing countries, and better navigate how to prevent them. Evidence has been generated and collected through desk-based research and nationally representative survey with internet-using children aged 12-17 and their caregivers in 13 countries across Eastern and Southern Africa and Southeast Asia. National reports and a series of data insight reports can be found on this page, presenting an overal understanding of the threats that online child sexual exploitation and abuse causes and national responses to the threat.

      EXCERPT: Disrupting harm project, hosted by the End Violence Partnership, in collaboration with ECPAT International, INTERPOL and the UNICEF Innocenti, to conduct research and assessment in 13 countries across Eastern and Southern Africa and Southeast Asia and generate and collect new evidence on how digital technology facilitates the sexual exploitation and abuse of children.

      LINK: https://www.end-violence.org/disrupting-harm#context

      TOPIC: child safety online

      TREND: online child sexual exploitation and abuse; disrupting harm

      DATE: November 2022

      COUNTRY: Global

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

  2. Oct 2022
    1. European Commission president Ursula von der Leyen has published her ‘2022 State of the Union Letter of Intent’, underpinning the Metaverse as an important digital opportunity and trend while also setting out plans for potential regulations of the Metaverse.

      The president acknowledges that Europe must adapt to the digital age and added that the EU ‘will continue looking at new digital opportunities and trends, such as the metaverse’. However, the letter provides little specifics on EU actions.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Shanghai Action Plan for Cultivating "Metaverse"

      A policy paper released by the Shanghai city government on 8 July 2022 outlined its developmental plan to cultivate a metaverse industry worth 350 billion yuan ($52 billion) by the end of 2025.

      The development action plan refers to the Metaverse as a new generation of information technology integration and innovation that would drive the growth of the internet toward Web3. The innovation plan focuses on promoting the development of Metaverse-related industries and helping Beijing build a benchmark city for the digital economy.

      The action plan aims at 'strengthening cutting-edge technological breakthroughs,' focusing on virtual reality headsets, chips, cloud computing and 5G technology.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The European Parliamentary Research Service ('EPRS') published, on 24 June 2022, its briefing, titled 'Metaverse: Opportunities, Risks and Policy Implications'. While the metaverse's exact scope and impact on society are still unknown, it can already be seen that it will open up a range of opportunities and risks in a variety of policy areas.

      The briefing, in particular, summarizes studies on the possible effects of metaverse platforms on several policy concerns, including competition, data protection, liability, financial transactions, cybersecurity, health, and accessibility and inclusiveness.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

  3. Aug 2022
  4. Jul 2022
    1. Title: Resolution on Safeguarding Humanitarian Data

      Resolution on Safeguarding Humanitarian Data addresses the centrality of data for humanitarian actions. It reiterates previous initiatives and resolutions of the International Red Cross and Red Crescent Movement.

      Here are a few key points from the resolution:

      • unauthorised access to data could undermine the principle of impartiality of humanitarian organisations;
      • states and other actors should respect humanitarian purpose of data;
      • work on a digital emblem as a sign to identify data of humanitarian organisations;
      • apply humanitarian principles online as it is done offline.

      Data breaches put humanitThe data breach against the Movement discovered this year has highlighted a growing trend in cyber-operations targeted at humanitarian organisations. Data breaches risk causing severe consequences for the people those organisations serve – those that are already among the most vulnerable. The Movement will reaffirm its commitment and responsibility to implement data protection rules and cyber security measures. It will also emphasize the urgency of protecting humanitarian data and send a call from the Movement to States and other actors to protect humanitarian organisations online as they do offline.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

  5. May 2022
    1. Global Cross-Border Privacy Rules Declaration aims to extend the current APEC Cross-Border Privacy Rules (CBPR) system worldwide.

      It is also an attempt to address the need for a regulatory framework for the cross-border flow of data. The current CBPR system used by APEC countries has been developed over the last 10 years with an international certification system, standard development, etc.

      The declaration is signed by Canada, Japan, the Republic of Korea, the Philippines, Singapore, Chinese Taipei, and the United States of America.

    2. Global Cross-Border Privacy Rules Declaration aims to extend the current APEC Cross-Border Privacy Rules (CBPR) system worldwide.

      It is also an attempt to address the need for a regulatory framework for the cross-border flow of data. The current CBPR system used by APEC countries has been developed over the last 10 years with an international certification system, standard development, etc.

      The declaration is signed by Canada, Japan, the Republic of Korea, the Philippines, Singapore, Chinese Taipei, and the United States of America.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

  6. Apr 2022
    1. TITLE: Encyclical LAUDATO SI - On Care for our common home - by Pope Francis

      TEXT: Laudato si' (Praise Be to You) is Pope Francis's encycical with subtitle "on care for our common home".

      In encyclical, the pope critiques consumerism and irresponsible development, laments environmental degradation and global warming. He also sets the basis for his approach towards new technologies.

      24 May 2015

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. United Nations Charter

      The Charter of the United Nations is the founding document of the United Nations. It was signed on 26 June 1945, in San Francisco, at the conclusion of the United Nations Conference on International Organization, and came into force on 24 October 1945.

      The United Nations can take action on a wide variety of issues due to its unique international character and the powers vested in its Charter, which is considered an international treaty. As such, the UN Charter is an instrument of international law, and UN Member States are bound by it. The UN Charter codifies the major principles of international relations, from sovereign equality of States to the prohibition of the use of force in international relations.

      Since the UN's founding in 1945, the mission and work of the Organization have been guided by the purposes and principles contained in its founding Charter, which has been amended three times in 1963, 1965, and 1973.

      24 October 1945

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Journal of Moral Theology dedicated special issue on 'artificial intelligence'.

      An Introduction to the Ethics of Artificial Intelligence Matthew J. Gaudet

      Artificial Intelligence and Moral Theology: A Conversation Brian Patrick Green, Matthew Gaudet, Levi Checketts, Brian Cutter, Noreen Herzfeld, Cory Labrecque, Anselm Ramelow, OP, Paul Scherz, Marga Vega, Andrea Vicini, SJ, Jordan Joseph Wales

      Artificial Intelligence and Social Control: Ethical Issues and Theological Resources Andrea Vicini, SJ

      Can Lethal Autonomous Weapons Be Just? Noreen Herzfeld

      We Must Find a Stronger Theological Voice: A Copeland Dialectic to Address Racism, Bias, and Inequity in Technology John P. Slattery

      Can a Robot Be a Person? De-Facing Personhood and Finding It Again with Levinas Roberto

      Metaphysics, Meaning, and Morality: A Theological Reflection on A.I. Jordan Joseph Wales

      The Vatican and Artificial Intelligence: An Interview with Bishop Paul Tighe by Brian Patrick Green

      Epilogue on AI and Moral Theology: Weaving Threads and Entangling Them Further Brian Patrick Green

      Source: https://jmt.scholasticahq.com/article/34133-table-of-contents-journal-of-moral-theology-vol-11-special-issue-no-1-spring-2022-artificial-intelligence

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. TITLE: UN Cybercrime Convention (draft by Russian Federation)

      CONTENT: Russian Federation submitted a proposed text for the UN Cybercrime Convention. It is used as one of inputs for negotiations.

      DATE: 29 June 2021

      TOPIC: cybercrime

      PROCESS: Negotiations of the UN Cybercrime Convetnion

      COUNTRY: Russia

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. TITLE: EU's Digital Market Act (DMA)

      CONTENT: Digital Market Act (DMA) aims to ensure proper functioning of the EU internal market by 'promoting effective competition in digital markets and in particular a fair and contestable online platform environment.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. TITLE: Cybersecurity of EU institutions, bodies and agencies - Special Report by European Court of Auditors

      CONTENT: The audited report of the cybersecurity of EU institutions, bodies and agencies (EUIBAs) concluded that EUIBAs' cyber preparedness is not adequate to cyber threats. It based this conclusion on the following elements:

      • increase level of cyber attacks of EUIBAs in times of pandemic and security crisis. The risk exposure is not likely to stop given global dynamcis.
      • cyber risks are based on technical interconnectenes of EUIBAs (networks, servers). Technical interdependence is not followed by organisational and human one. There is lack of synergies on projects, tools and platforms such as email or videoconferencing.
      • cybersecurity governance is lacking: strategies, policies, risk assessment, etc.
      • cybersecurity training is not always systematic.
      • two main cybersecurity institutions The Computer Emergency Response Team of the EUIBAs (CERT-EU) and the European Union Agency for Cybersecurity (ENISA) are not adequately supported for cybersecurity challenges they face.

      Report proposes a few immediate steps:

      • legal framework for cybersecurity binding rules for all EUIBAs
      • increased resources for CERT-EU
      • promotion of synergies via the Institutional Committee for the Digital Transoformation
      • focus work on CERT-EU and ENISa on the less cybersecurity mature EUIBAs.
    2. TITLE: Cybersecurity of EU institutions, bodies and agencies - Special Report by European Court of Auditors

      CONTENT: The audited report of the cybersecurity of EU institutions, bodies and agencies (EUIBAs) concluded that EUIBAs' cyber preparedness is not adequate to cyber threats. It based this conclusion on the following elements:

      • increase level of cyber attacks of EUIBAs in times of pandemic and security crisis. The risk exposure is not likely to stop given global dynamcis.
      • cyber risks are based on technical interconnectenes of EUIBAs (networks, servers). Technical interdependence is not followed by organisational and human one. There is lack of synergies on projects, tools and platforms such as email or videoconferencing.
      • cybersecurity governance is lacking: strategies, policies, risk assessment, etc.
      • cybersecurity training is not always systematic.
      • two main cybersecurity institutions The Computer Emergency Response Team of the EUIBAs (CERT-EU) and the European Union Agency for Cybersecurity (ENISA) are not adequately supported for cybersecurity challenges they face.

      Report proposes a few immediate steps:

      • legal framework for cybersecurity binding rules for all EUIBAs
      • increased resources for CERT-EU
      • promotion of synergies via the Institutional Committee for the Digital Transoformation
      • focus work on CERT-EU and ENISa on the less cybersecurity mature EUIBAs.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The United States has announced the Indo-Pacific Strategy (February 2022) calling for a free and open, connected, prosperous, secure, and resilient Indo-Pacific region. This strategy aims to limit China's growing influence in the region.

      The Strategy includes prominent digital and cyber elements, as shown below.

      Cross-border data is one pillar of this strategy's commerce aspect. The two other pillars are high labor standards and high environmental standards.

      The call for Open RAN Standards and Technologies aims at limiting the dominance by Huawei proprietary standards for 5G networks.

      Regional digital connectivity in Indo-Pacific with a link to EuroAtlantic regional networks are key infrastructural elements of the Strategy. US digital foreign policy is focusing its attention on two key strategic regions: Indo-Pacific, and Euro-Atlantic.

      In cybersecurity, the strategy calls for "new regional initiatives to improve collective cybersecurity and rapidly respond to cyber incidents." The strategy also calls for the mitigation of online radicalization.

      The Quad is called to support building cyber capacities in South and Southeast Asia and the Pacific Islands.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

  7. Mar 2022