11,086 Matching Annotations
  1. Jul 2022
    1. to promote sharing of standardised digital data
    2. to promote digitalisation and data sharing in favour of sustainability and the SDGs

      linking data and sustainability/SDGs

    3. Public diplomacy

      Mention of public diplomacy

    4. funding to combat Internet shutdowns
    5. by fostering digital literacy

      link to Malta's priority on the UN SC.

    6. 19.

      human rights

    7. n international standard-setting processes
    8. the whole life-cycle of digital technologies
    9. 18

      human rights

    10. he Declaration for the Future of the Internet.
    11. with like-minded partners
    12. to promote new and innovative digitalisation tools d

      which one?

    13. a global tech panel

      What is a global tech panel?

    14. for continued dialogue and cooperation with the private sector, including online platforms, and civil society
    15. a Team Europe approach

      ||sorina|| What is this approach about?

    16. as part of the implementation of the Global Gateway strategy.

      Probably, we need to analyse more the Global Gateway strategy.

    17. o increase the visibility of the EU globally
    18. the digital trade provisions in existing EU trade agreements
    19. Eastern Partnership’s EU4Digital Initiative
    20. the UN Tech Envoy
    21. he third committee of the UNGA,
    22. he Human Rights Council,
    23. 10.

      mix of human rights and multilateral cooperaiton.

    24. EU coordination on elections and appointments for positions at UN and other relevant multilateral bodies
    25. particularly in standardisation bodies,

      More relevant approach.

    26. as appropriate, including multi-stakeholder

      More conditioned approach to multi-stakeholder approach.

    27. EU Digital Diplomacy and Cyber Diplomacy

      What is difference between digital and cyber diplomacy?

    28. to monitor global digital regulatory activity

      relevant activities for Digital Watch

    29. -

      cybersecurity

    30. a climate neutral economy
    31. -

      link digitalisation and climate change

    32. promote European examples of ethical approaches to data usage

      GDPR

    33. -

      cybersecurity

    34. -

      process and governance approach

    35. Exchange with stakeholders from business, academia and civil society as appropriate, both in the EU and beyond
    36. -

      content policy and cybersecurity

    37. through support for the Paris and Christchurch Calls
    38. -

      cybersecurity

    39. -

      Link between EU's internal and international policy

    40. -

      human rights

    41. 11406/22EA/fa4ANNEXRELEX.1EN-

      Conflate together SDGs and Global Digital Compact.

    42. theInternational Telecommunications Union (ITU), International Organization for Standardization (ISO), International Electrotechnical Commission (IEC),

      It is usual list of international standardisation organisation.

    43. he Institute of Electrical and Electronics Engineers (IEEE).

      Why EU does not include W3C and other standardisation bodies

    44. -

      digital standards

    45. based on the multi-stakeholder model of Internet governance.

      shift from dual approach of multilateral and multistakeholder approach. Internet governance is considered in narrower context as governance of technological infrastructure. It is departure from the WSIS definition of IG which considers IG as not only governance of the Internet but also governance on the Internet (data, economy, human rights, etc.).

    46. -

      technology

    47. -

      human rights

    48. a human-centric and human rights-based approac
    49. -

      geopolitics

    50. common geopolitical priorities
    51. 5.

      Cybersecurity

    52. built on universal human rights, fundamental freedoms, the rule of law and democratic principles.
    53. its technological and digital sovereignty
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Calibre is a good software for ebooks publishing

      ||Jovan||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Virtual interaction is a simulation of real human life.
    2. my temporal body to be genuine flesh and my soul something that is authentic and eternal
    3. Many scientists and philosophers have suggested that we all might be living in a simulation of some advanced civilization. As fantastic as it sounds, Scientific American reported in 2020 that the odds of this are probably about 50–50.
    4. no-Zoom weekends and a complete moratorium during your summer vacation
    5. on boundaries around our use of the technology
    6. good Zoom hygiene
    7. keeping virtual meetings, classes, and conversations short and to-the-point.
    8. For happiness and productivity, virtual interactions are better than nothing. But in-person interactions are better than virtual ones for life satisfaction, work engagement, and creativity.
    9. videoconferencing inhibits the production of creative ideas.
    10. the Journal of Applied Psychology, researchers who monitored 103 virtual workers’ fatigue during meetings found that when workers used their camera (versus having it turned off), they were less engaged during meetings that day and the one after as well.
    11. One 2021 study in the journal NeuroRegulation found that almost 94 percent of undergraduates had “moderate to considerable difficulty with online learning.”
    12. may be better for well-being than having no social interactions, using video-calling to the point of fatigue has been shown to predict high rates of depression, anxiety, stress, and dissatisfaction with life.
    13. it mutes mirror neurons (which help us understand and empathize with others) and confounds our Global Positioning System neurons (which code our location).
    14. Zoom fatigue has six root causes: asynchronicity of communication (you aren’t quite in rhythm with others, especially when connections are imperfect); lack of body language; lack of eye contact; increased self-awareness (you are looking at yourself a lot of the time); interaction with multiple faces (you are focusing on many people at once in a small field of view, which is confusing and unnatural); and multitasking opportunities (you check your email and the news while trying to pay attention to the meeting).

      On emotional aspects of tele-conferencing.

    15. Zoom fatigue rises with frequency and duration of meetings.
    16. Videochatting may promise the benefits of face-to-face meeting without germs and commuting. But it can provoke burnout for many, and even depression. When it comes to human interaction, it is like junk food: filling and convenient, but no substitute for a healthy diet.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. ISBNs will need to be changed if certain changes are made to your book.
    2. The 13 digit ISBN number is broken up into 5 parts that identify the following:

      Meaning of 13 digits.

    3. But, as we will mention further along in this post, be sure you have only one ISBN number registered to your self-published book and not multiple numbers spread out over various platforms.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Most important ap

      ||sorina||||VladaR|| Here you have some statistic on time of use of computers, use of apps, etc.

    2. African youth consider universal WiFi to be a fundamental human right

      ||sorina||||VladaR|| Universal WiFi should be a fundamental human right according to African youth.

    3. The majority (53%) of youth believe that Western style democracy is not necessarily suitable for the African context, and contend that African countries will need to find their own democratic systems and structures that work for the continent and its people.

      ||VladaR||||sorina|| This is an interesting study where 53% of African youth believe that AFrica should develop itsown type of democracy with the most important aspect to be equality of all citizens.

    4. African youth see equality of all citizens under the law as the most important democratic value.
    5. equality of all citizens under the law as the most important democratic value.
    6. equality of all citizens under the law as the most important democratic value.
    7. Political instability may be another reason for the decline in Afro-optimism, particularly in countries afflicted with conflict, civil war, and violent extremism in recent years
    8. hree-quarters of African youth believe that owning land is essential for their financial wellbeing
    9. early two-thirds of African youth find the price of mobile data coverage to be high, and just one-in-eight can afford data coverage at all times. In terms of news outlets,
    10. equality of all citizens under the law, freedom of speech, and free and fair elections as the most important pillars of democracy
    11. for African-style democracy
    12. remain optimistic about their personal future and look ahead into an African century.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. t is crucial that African governments adopt multi-stakeholder policies and legal frameworks that leverage nongovernment expertise and ensure adequate oversight of security actors wading into the ICT arena.
    2. The lack of knowledge of cyber issues has contributed to a lack of effective regulation and oversight, while amplifying opportunities for abuse.
    3. Eighteen have established the equivalent of national computer incident response teams (CIRTs), or multi-stakeholder groups of cybersecurity professionals who help countries respond to and recover from major security incidents.

      Do we have list of AFrican CERTs?

    4. Governments frequently fail to monitor threats, collect digital forensic evidence, and prosecute computer-based crime.  Ninety-six percent of cyber security incidents go unreported or unresolved, meaning that cyber threats in Africa are likely much worse than recognized.
    5. Drones are already used by 14 African countries and have been acquired and used for intelligence purposes by African militant groups.
    6. Despite Liberia’s appeals abroad for assistance, authorities did not make arrests until after the software employed in the attack was used to disable Deutsche Telecom, the German telecommunications giant, months after the attacks began.
    7. In Africa, attacks on critical infrastructure are becoming frequent. Banks are particularly common targets, losing billions of dollars to theft and service disruption. The National Security Agency of Nigeria and the municipal government of Johannesburg have each been victims of attacks that shut down services or leaked sensitive information. With cyberattacks against maritime infrastructure on the rise ranging from piracy to stealing database logs, experts worry that Africa’s ports and shipping industries could suffer an attack causing major disruptions in trade and commerce.

      ||sorina||||VladaR|| the most vulnerable parts of African society

    8. China may have similar capabilities elsewhere in Africa, where it has built up to 80 percent of all existing telecommunications networks and set up government networks in over 20 countries.

      ||sorina|| Chinese presence in Africa.

    9. For example, Pegasus malware, among the most sophisticated pieces of espionage software ever invented, was recently discovered to have infected systems in 11 African countries.
    10. In June 2020, the Ethiopian Information Network Security Agency (INSA) thwarted a cyberattack from an Egypt-based actor known as the Cyber_Horus Group.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. These include the Policy and Regulation Initiative for Digital Africa (PRIDA), the West African Response on Cybersecurity and Fight against Cybercrime  (OCWAR-C), the AU Commission’s-Global Forum on Cyber Expertise (GFCE) joint cyber capacity building initiatives, and efforts by the Africa Computer Emergency Response Team (AfricaCERT
    2. More cyber-mature countries should focus on overcoming obstacles to interagency coordination, regularly updating their strategies, and attempting to look ahead to meet the next generation of threats. They can and should play a leading role in establishing good practices, building capacity, supporting indigenous research and development of digital tools (including algorithms and encryption technologies), and improving regional and international cyber cooperation in Africa.
    3. As a result, most African nations are woefully underprepared to confront advances in artificial intelligence, wireless communications, quantum computing, and automation that are likely to characterize the coming decade.
    4. A central challenge for African legislatures, then, is to enact laws that empower regulators to quickly adapt in a dynamic environment without trying to legislate minutia.

      ||VladaR||||sorina|| This is of relevance for parliamentarians in AFrica.

    5. national cybersecurity strategies should ideally be updated every 5 years as a matter of course.
    6. the five African countries that have not updated their national cybersecurity strategies in the past 5 years—Kenya, Mauritius, Morocco, South Africa, and Uganda—are widely considered to be among the continent’s most cyber mature.
    7. Strategies are key instruments that designate society-wide roles and responsibilities, in part to overcome obstacles to interagency coordination
    8. For example, because the African financial sector is a primary target for cyber fraud, Africa-based banks invest significant resources in complying with international cybersecurity norms, regulations, and standards.
    9. The logic for including private sector actors and making public-private partnerships a focal point of national cybersecurity strategies is straightforward.
    10. Fewer than half of all countries with national cybersecurity strategies possessed either threat assessments (which help justify the strategy’s existence and tailor the response to the threat) or resource allocations (which are necessary to ensure a strategy’s implementation).

      Here is an interesting survey of national cybersecurity strategies.

      ||sorina||||VladaR||

    11. about a third (17) of Africa’s 54 countries have completed a national cybersecurity strategy, which is less than half the global average.

      ||VladaR||||sorina|| Low level of adoption of national cybersecurity strategies.

    12. At the regional level, there is no dearth of initiatives that aim to address the continent’s growing cyber-related threats and challenges. Beginning in 2019, the Economic Community of West African States (ECOWAS) Commission, in partnership with the European Union (EU), initiated the West African Response on Cybersecurity and Fight against Cybercrime (OCWAR-C) and adopted a Regional Cybersecurity and Cybercrime Strategy. The African Union Mechanism for Police Cooperation (AFRIPOL) created a Cybercrime Strategy 2020-2024 that seeks to enhance coordination, develop specialized police capacities, and harmonize legal and regulatory frameworks. Meanwhile, the African Union (AU) is working to craft and implement its own continental cybersecurity strategy through its recently established Cyber Security Experts Group. Through the formation of the Africa Cyber Experts (ACE) Community, the AU is partnering with the Global Forum on Cyber Expertise (GFCE) to support cyber capacity building.

      ||VladaR||||sorina|| Here is the survey of various cybersecurity initiatives in Africa. You may use it for training.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Islamic advisory body — Dar-al-Ifta — released a decree declaring cryptocurrencies as Haram (something prohibited in Islamic law). Islamic finance does not allow the concept of “riba” or interest. To bypass this, they introduced the Sukuk. Sukuk is an Islamic financial certificate similar to a bond in Western finance but complies with Islamic religious law. However, the income derived from the Sukuk can not be speculative, or it would no longer be permissible. That eliminates bitcoin and other cryptocurrencies because they are speculative.

      ||ArvinKamberi||||sorina||||VladaR|| Arvin, here is an interesting info on the reason why some muslim countreis ban cryptocurrencies as speculative ones which is not allowed according to Islam. It could be an interesting update to research a bit more on it.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Unfortunately, CISOs struggle to find competent staff that can handle the security alerts they receive daily,keep up with data protection regulations, andprotect networks from cybercriminals.
    2. Currently, however, only 14out of the 54countrieson the continenthave enacted specific laws against cybercrime. Another 11countries have partial laws, and 30 have no meaningful cybercrime laws. As noted previously, only 14 countries had agreed to join the 2014 Malabo Convention framework at the end of 2019
    3. only14 out of the 54countries in Africa havesigned thistreaty,and only eighthadratified the treaty atthe end of 2020.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. “In addition, one out of every three companies believes that there is insufficient integration between security and IT teams with 30% saying that hiring and retaining security skills is a challenge.”
    2. The top threats facing organizations in SSA in 2022 are data leakage (61%), insider threats (43%); targeted attacks using phishing (37%); cloud-related attacks (34%); and ransomware attacks (30%).

      ||sorina|| Not clear what is percentage of?

    3. This opens up the threat landscape considerably and puts organisations at greater risk.
    4. There is a linear relationship between GDP and cybercrime.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. increased national commitments (NDCs) and net zero targets
    2. to accelerate transitions to clean growth
    3. or a successfully negotiated outcome and overall event
    4. Allocations were made by prioritising funding for regional events, SIDS, climate vulnerable countries, smaller posts, and the four campaign goals.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. China and West start 'development battle' for, mainly, Africa. Forlong time China's Belt and Road Initiative has been the main mega-development initiative.

      BRI was criticised for being China's 'debt-trap diplomacy with investement of USD 890 billion mainly in infrastructur projects.

      This starting changing in 2022. On 26th June, G7 countries announced the Parntership for Global Infrastructure and Investement (PGII) announcing private and public investement of USD 600 billion.

      PGII and BRI could complementary with PGII focusing on 'soft development' of digital connectivity, climate, health and BRI aiming 'hard development' such as building prots and railways.

      But, China announced the Global Development Initiative (GDI) which is like to compete in 'soft development'.

      Digital development is likely to become competition zone between China's GDI and G7 PGII initiatives as focus will be on 5g telecoms, blockchain, data centers, etc.

      Together with Africa, Pacific region will be one of battle ground of this battle for geopoliticall influence via develpment assistance. In other to counter China's growing presence, Japan, South Korea, Australia, New Zealand, and United States launched Blue Pacific Pact.

      Some analysist are sceptical about G7 initiative as they see it as repackaging of the last year initiative of Build Back Better World which has to be repacked due to lack of congressional support in the USA.

      It is not yet clear how new G7 initiative will relate to other similar initiatives, including Blue Dot Network (started by USA, Japan and Australia in 2019 Global Gateway scheme of EU to mobilise USD 340 bn Clean Grean Initative by Britain.

      Thus, it is not clear how much fresh investement will go into G7 initiative. The success will answer the often posed question when West was criticising China's BRI initiative: 'What are you offering instead?

    2. There are also overlaps with the eu’s Global Gateway scheme, launched in December to “mobilise” €300bn ($340bn) in infrastructure investment by 2027, and Britain’s Clean Green Initiative, unveiled a month earlier with a pledge of £3bn ($4.1bn) for sustainable infrastructure in developing countries.
    3. t is a repackaging of an idea called Build Back Better World that was launched at the group’s summit last year.
    4. the Partners in the Blue Pacific pact, aimed at offsetting Chinese influence in the Pacific islands.
    5. by focusing on “soft” infrastructure where they have comparative advantages, Western countries aim to boost exports of their own technology and services in areas such as 5g telecoms, blockchain and clean energy.
    6. the Global Development Initiative, which is expected to focus more on sustainable development.
    7. Western officials say the scheme will not compete directly with the bri, which has focused on ports, railways and other “hard” infrastructure. Instead, it will try to play to the g7’s strengths by prioritising climate and energy security, digital connectivity, health and women’s equality.
    8. the Partnership for Global Infrastructure and Investment (pgii)
    9. On June 26th the rich democracies of the g7 unveiled a plan to mobilise $600bn of private and public investment in infrastructure in low- and middle-income countries over the next five years
    10. And every time America criticised China’s “new Silk Road”, the riposte came: “What are you offering instead?”
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Perhaps the labour market will regain some slack as Europe’s economy slows down. Soaring energy prices have soured the mood in recent weeks, as has a resurgence of covid. That would hardly be good news, except for hard-up employers—and those looking to catch a bit of downtime on a far-flung beach.
    2. handling e-commerce packages for decent pay while listening to podcasts beats arriving at 5am to ask passengers whether they have packed any liquids in their carry-on.
    3. “Everyone’s asking, where have they all gone?” pondered Tim Clark, the boss of Emirates airline, according to Bloomberg. “And the answer is always: Amazon.”
    4. Poles and Bulgarians now find plenty of good jobs at home.
    5. Unemployment in the euro area, at 6.6%, is at its lowest since the single currency was launched two decades ago. Some places have all but run out of workers: Germany’s jobless rate is just 2.8%.
    6. But airports’ difficulties are not merely the result of local labour troubles.
    7. Airports should have been prepared. Forecasting the number of travellers on a given day is not unreasonably complicated, given that they have bought tickets well beforehand.
    8. Instead it sent the euro tanking (to near parity with the American dollar), making Greek tavernas and Baltic beaches irresistible.
    9. For Europe, which attracts half the world’s international travellers, that ought to be a boon.
    10. In no sector is the lack of staff so glaring as in air travel.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Like it or not, the world wants Japan, and Japan needs the world.
    2. The country needs to quadruple the number of foreign workers by 2040 to sustain the government’s modest average growth target of 1.2%, according to a recent study by a group of Japanese think-tanks. (Without sustained investment in automation, the number would have to rise more than ten-fold.)
    3. Japan has already lost a cohort of foreign students, the very people who often go on to become bridge-builders between countries.
    4. Border closures have been popular: nearly 90% of Japanese approved when Kishida Fumio, Japan’s prime minister, tightened travel restrictions in response to the outbreak of the Omicron variant late last year.
    5. Japanese nationals were largely free to come and go. Foreigners, even those with permanent residence, faced restrictions.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Notes for future research

      Statistcs/numbers: 1 billion uses of TikTok

      • user spend 50% longer on TikTok than on Instagram.

      Engaging slogan by Tik-Tok - add to other slogans developed by Facebook, Goolge, etc.

    2. HEADLINE How future of TikTok can determine the future of the integrated Internet?

      EXCERPTS TIKTok saga will shape the future of the Internet. If TikTok is banned in the USA as a security risk, it could lead towards further disintegration of the Internet. In the same time, Chinese side has to be ready to accept higher scrutiny of TikTok algorithms and business models. By monitoring this policy issue we will monitor the future of integrated Internet.

      SUMMARY

      TikTok controversy, as the Economist put it, s a test of whether global business and the global internet can remain intact as us-China relations deteriorate.

      Context for pressure on TikTok is geopolitics and forthcoming elections in the USA. There is a concern that TikTok could be used to influence eletions.

      Is privacy protection real risk since most of TikTok data can be scraped as public data.

      The real risk that concers US is a possibility of manipuating domestic audience by company which is in Chinese ownership. For examplea quarter of American users consider TikTok to be a news source.

      TikTok algorithms that could be used for manipulation are developed mainly in Beijing.

      TikTok can address the risk of shutting down by having data held by Oracle, as already happened during Trump administration, letting third parties inspect its algorithms, including showing the source code and allowing ongoing inspection.

      According to the Economist: 'TikTok should be ultimately responsible to an independent board of its own, with members from outside China.'

      China is likely to oppose this request for supervision of TikTok's algorithms. However, by doing so, China may make this companies shut down by Western authorities. It will be one of the key decisions and trade-offs with far-reaching consequences for global Internet that China will have to make.

    3. If it refuses, the likely result is that TikTok—and more companies like it—will be locked out of the West altogether.
    4. reluctant to cede any corporate control to foreigners.
    5. classified content-recommendation algorithms as a key technology and may object to TikTok’s code being made available for dissection
    6. TikTok should be ultimately responsible to an independent board of its own, with members from outside China
    7. showing the source code and allowing ongoing inspection
    8. to let third parties inspect its algorithm.
    9. data are held by Oracle
    10. Western countries might one day have to shut TikTok down.
    11. Because each user gets a personalised feed, tampering would be hard to spot.
    12. But the app’s algorithm is nurtured in Beijing
    13. A quarter of American users say they consider TikTok to be a news source.
    14. it offers China to manipulate what the app’s vast foreign audience sees.
    15. Most such information could be scraped from TikTok’s front end
    16. risk is privacy
    17. America often accuses China of copycat capitalism. Now the boot is on the other foot.
    18. to reach $12bn this year and $23bn in 2024
    19. user spends 50% longer on the app each day than the typical user spends on Instagram.
    20. sign up its first 1bn users in half the time it took Facebook.
    21. a test of whether global business and the global internet can remain intact as us-China relations deteriorate.

      Test for integrated Internet

    22. a security risk to the Chinese Communist Party’s enemies
    23. storm in Congress
    24. elections loom in America
    25. the sunny app has a dark side
    26. its 1bn-plus users
    27. as “the last sunny corner on the internet”.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. But the predictable is as much a human need as are ruptures from the predictable.
    2. to offer what is so beloved about rules, which is the increase of what Daston terms the “radius of predictability.”
    3. Alice’s Wonderland is a place where the only rule is that the rules will keep changing.
    4. Daston describes how, historically, sovereignty in Europe has been derived from a mix of “divine authority, the patriarchal power of the male head of household over his wife and children, and the power of the conqueror over the vanquished in war.”
    5. Carl Schmitt’s definition of sovereignty as “the power to decide on the exception,”
    6. Rules that allow no exception seem free of human frailty but alien, and unable to admit properly of complexity.
    7. Rules that leave a ruler, or a judge, in charge of interpreting them feel at once humanized and corruptible.
    8. In this way, the nonsense nested within the cadence of sense becomes vivid.
    9. Algorithms, which were closely associated with reason, came to be valued as more ideal than error-prone human judgment.
    10. Daston suggests that rules tend to succeed when they are also norms.
    11. A computer algorithm is an example of a thin rule—long, perhaps, but intended to be deployed without the need of any human thought or intervention.
    12. thin rules “aspire to be self-sufficient.”
    13. they require interpretation, and because examples are given, and because they make room for all sorts of exceptions.
    14. rules were derived from models:
    15. Similarly, the Latin term regula connects both to straight planks used for measuring and building and to a model by which others are measured more metaphorically—the ruler of a nation, say.
    16. Daston helps us see rules (and their neighbors, such as laws and regulations) through the concepts of thickness and thinness, paradigms and algorithms, failures
    17. when reasoning as we would recognize it proves even minimally consequential.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The party can probably tighten security in its own internal networks. But governing in China, as elsewhere, is all about priorities. And continued surveillance over its own citizens will remain far more important to the authorities than protecting those citizens’ data.
    2. the party’s competence.
    3. The hashtag “data leak” was blocked on Weibo, a microblog, soon after news started to circulate. Discussion on WeChat, a messaging app, is also constrained.
    4. “China is a dictatorial state but that does not mean the state can do anything it likes, because individuals are going to get a bit angry,”
    5. the law is enforced less strictly on officialdom, and there is little evidence of any change.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. The document is ridiculously broad. It says the state should “promote the culinary and gastronomic heritage” of Chile and recognise “spirituality as an essential element of the human being”. Everyone has a “right to sports”. Non-humans get a look in, too: the state “will promote an education based on empathy…for animals”.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. Title: Resolution on Safeguarding Humanitarian Data

      Resolution on Safeguarding Humanitarian Data addresses the centrality of data for humanitarian actions. It reiterates previous initiatives and resolutions of the International Red Cross and Red Crescent Movement.

      Here are a few key points from the resolution:

      • unauthorised access to data could undermine the principle of impartiality of humanitarian organisations;
      • states and other actors should respect humanitarian purpose of data;
      • work on a digital emblem as a sign to identify data of humanitarian organisations;
      • apply humanitarian principles online as it is done offline.

      Data breaches put humanitThe data breach against the Movement discovered this year has highlighted a growing trend in cyber-operations targeted at humanitarian organisations. Data breaches risk causing severe consequences for the people those organisations serve – those that are already among the most vulnerable. The Movement will reaffirm its commitment and responsibility to implement data protection rules and cyber security measures. It will also emphasize the urgency of protecting humanitarian data and send a call from the Movement to States and other actors to protect humanitarian organisations online as they do offline.

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. the broad refusal to recognize the right of the West to lead means there will no longer be a world order based on Western rules.
    2. the specter of China looms – a systemic competitor to the West and, even better, an accomplice of ‘the Russians’.
    3. the former third world is becoming more demanding and picky
    4. it has now completely lost the desire to share its advantages.
    Created with Sketch. Visit annotations in context

    Created with Sketch. Annotators

    Created with Sketch. URL