- Jul 2022
-
selfpublishing.com selfpublishing.com
-
The 13 digit ISBN number is broken up into 5 parts that identify the following:
Meaning of 13 digits.
-
But, as we will mention further along in this post, be sure you have only one ISBN number registered to your self-published book and not multiple numbers spread out over various platforms.
-
-
ichikowitzfoundation.com ichikowitzfoundation.com
-
Most important ap
||sorina||||VladaR|| Here you have some statistic on time of use of computers, use of apps, etc.
-
African youth consider universal WiFi to be a fundamental human right
||sorina||||VladaR|| Universal WiFi should be a fundamental human right according to African youth.
-
The majority (53%) of youth believe that Western style democracy is not necessarily suitable for the African context, and contend that African countries will need to find their own democratic systems and structures that work for the continent and its people.
||VladaR||||sorina|| This is an interesting study where 53% of African youth believe that AFrica should develop itsown type of democracy with the most important aspect to be equality of all citizens.
-
African youth see equality of all citizens under the law as the most important democratic value.
-
equality of all citizens under the law as the most important democratic value.
-
equality of all citizens under the law as the most important democratic value.
-
Political instability may be another reason for the decline in Afro-optimism, particularly in countries afflicted with conflict, civil war, and violent extremism in recent years
-
hree-quarters of African youth believe that owning land is essential for their financial wellbeing
-
early two-thirds of African youth find the price of mobile data coverage to be high, and just one-in-eight can afford data coverage at all times. In terms of news outlets,
-
equality of all citizens under the law, freedom of speech, and free and fair elections as the most important pillars of democracy
-
for African-style democracy
-
remain optimistic about their personal future and look ahead into an African century.
-
-
africacenter.org africacenter.org
-
t is crucial that African governments adopt multi-stakeholder policies and legal frameworks that leverage nongovernment expertise and ensure adequate oversight of security actors wading into the ICT arena.
-
The lack of knowledge of cyber issues has contributed to a lack of effective regulation and oversight, while amplifying opportunities for abuse.
-
Eighteen have established the equivalent of national computer incident response teams (CIRTs), or multi-stakeholder groups of cybersecurity professionals who help countries respond to and recover from major security incidents.
Do we have list of AFrican CERTs?
-
Governments frequently fail to monitor threats, collect digital forensic evidence, and prosecute computer-based crime. Ninety-six percent of cyber security incidents go unreported or unresolved, meaning that cyber threats in Africa are likely much worse than recognized.
-
Drones are already used by 14 African countries and have been acquired and used for intelligence purposes by African militant groups.
-
Despite Liberia’s appeals abroad for assistance, authorities did not make arrests until after the software employed in the attack was used to disable Deutsche Telecom, the German telecommunications giant, months after the attacks began.
-
In Africa, attacks on critical infrastructure are becoming frequent. Banks are particularly common targets, losing billions of dollars to theft and service disruption. The National Security Agency of Nigeria and the municipal government of Johannesburg have each been victims of attacks that shut down services or leaked sensitive information. With cyberattacks against maritime infrastructure on the rise ranging from piracy to stealing database logs, experts worry that Africa’s ports and shipping industries could suffer an attack causing major disruptions in trade and commerce.
||sorina||||VladaR|| the most vulnerable parts of African society
-
China may have similar capabilities elsewhere in Africa, where it has built up to 80 percent of all existing telecommunications networks and set up government networks in over 20 countries.
||sorina|| Chinese presence in Africa.
-
For example, Pegasus malware, among the most sophisticated pieces of espionage software ever invented, was recently discovered to have infected systems in 11 African countries.
-
In June 2020, the Ethiopian Information Network Security Agency (INSA) thwarted a cyberattack from an Egypt-based actor known as the Cyber_Horus Group.
-
-
africacenter.org africacenter.org
-
These include the Policy and Regulation Initiative for Digital Africa (PRIDA), the West African Response on Cybersecurity and Fight against Cybercrime (OCWAR-C), the AU Commission’s-Global Forum on Cyber Expertise (GFCE) joint cyber capacity building initiatives, and efforts by the Africa Computer Emergency Response Team (AfricaCERT
-
More cyber-mature countries should focus on overcoming obstacles to interagency coordination, regularly updating their strategies, and attempting to look ahead to meet the next generation of threats. They can and should play a leading role in establishing good practices, building capacity, supporting indigenous research and development of digital tools (including algorithms and encryption technologies), and improving regional and international cyber cooperation in Africa.
-
As a result, most African nations are woefully underprepared to confront advances in artificial intelligence, wireless communications, quantum computing, and automation that are likely to characterize the coming decade.
-
A central challenge for African legislatures, then, is to enact laws that empower regulators to quickly adapt in a dynamic environment without trying to legislate minutia.
||VladaR||||sorina|| This is of relevance for parliamentarians in AFrica.
-
national cybersecurity strategies should ideally be updated every 5 years as a matter of course.
-
the five African countries that have not updated their national cybersecurity strategies in the past 5 years—Kenya, Mauritius, Morocco, South Africa, and Uganda—are widely considered to be among the continent’s most cyber mature.
-
Strategies are key instruments that designate society-wide roles and responsibilities, in part to overcome obstacles to interagency coordination
-
For example, because the African financial sector is a primary target for cyber fraud, Africa-based banks invest significant resources in complying with international cybersecurity norms, regulations, and standards.
-
The logic for including private sector actors and making public-private partnerships a focal point of national cybersecurity strategies is straightforward.
-
Fewer than half of all countries with national cybersecurity strategies possessed either threat assessments (which help justify the strategy’s existence and tailor the response to the threat) or resource allocations (which are necessary to ensure a strategy’s implementation).
Here is an interesting survey of national cybersecurity strategies.
||sorina||||VladaR||
-
about a third (17) of Africa’s 54 countries have completed a national cybersecurity strategy, which is less than half the global average.
||VladaR||||sorina|| Low level of adoption of national cybersecurity strategies.
-
At the regional level, there is no dearth of initiatives that aim to address the continent’s growing cyber-related threats and challenges. Beginning in 2019, the Economic Community of West African States (ECOWAS) Commission, in partnership with the European Union (EU), initiated the West African Response on Cybersecurity and Fight against Cybercrime (OCWAR-C) and adopted a Regional Cybersecurity and Cybercrime Strategy. The African Union Mechanism for Police Cooperation (AFRIPOL) created a Cybercrime Strategy 2020-2024 that seeks to enhance coordination, develop specialized police capacities, and harmonize legal and regulatory frameworks. Meanwhile, the African Union (AU) is working to craft and implement its own continental cybersecurity strategy through its recently established Cyber Security Experts Group. Through the formation of the Africa Cyber Experts (ACE) Community, the AU is partnering with the Global Forum on Cyber Expertise (GFCE) to support cyber capacity building.
||VladaR||||sorina|| Here is the survey of various cybersecurity initiatives in Africa. You may use it for training.
-
-
venturesafrica.com venturesafrica.com
-
Islamic advisory body — Dar-al-Ifta — released a decree declaring cryptocurrencies as Haram (something prohibited in Islamic law). Islamic finance does not allow the concept of “riba” or interest. To bypass this, they introduced the Sukuk. Sukuk is an Islamic financial certificate similar to a bond in Western finance but complies with Islamic religious law. However, the income derived from the Sukuk can not be speculative, or it would no longer be permissible. That eliminates bitcoin and other cryptocurrencies because they are speculative.
||ArvinKamberi||||sorina||||VladaR|| Arvin, here is an interesting info on the reason why some muslim countreis ban cryptocurrencies as speculative ones which is not allowed according to Islam. It could be an interesting update to research a bit more on it.
-
-
www.knowbe4.com www.knowbe4.com
-
Unfortunately, CISOs struggle to find competent staff that can handle the security alerts they receive daily,keep up with data protection regulations, andprotect networks from cybercriminals.
-
Currently, however, only 14out of the 54countrieson the continenthave enacted specific laws against cybercrime. Another 11countries have partial laws, and 30 have no meaningful cybercrime laws. As noted previously, only 14 countries had agreed to join the 2014 Malabo Convention framework at the end of 2019
-
only14 out of the 54countries in Africa havesigned thistreaty,and only eighthadratified the treaty atthe end of 2020.
-
-
info.knowbe4.com info.knowbe4.com
-
Report:
||Jovan|| We may share reports in this way.
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
“In addition, one out of every three companies believes that there is insufficient integration between security and IT teams with 30% saying that hiring and retaining security skills is a challenge.”
-
The top threats facing organizations in SSA in 2022 are data leakage (61%), insider threats (43%); targeted attacks using phishing (37%); cloud-related attacks (34%); and ransomware attacks (30%).
||sorina|| Not clear what is percentage of?
-
This opens up the threat landscape considerably and puts organisations at greater risk.
-
There is a linear relationship between GDP and cybercrime.
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
increased national commitments (NDCs) and net zero targets
-
to accelerate transitions to clean growth
-
or a successfully negotiated outcome and overall event
-
Allocations were made by prioritising funding for regional events, SIDS, climate vulnerable countries, smaller posts, and the four campaign goals.
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
China and West start 'development battle' for, mainly, Africa. Forlong time China's Belt and Road Initiative has been the main mega-development initiative.
BRI was criticised for being China's 'debt-trap diplomacy with investement of USD 890 billion mainly in infrastructur projects.
This starting changing in 2022. On 26th June, G7 countries announced the Parntership for Global Infrastructure and Investement (PGII) announcing private and public investement of USD 600 billion.
PGII and BRI could complementary with PGII focusing on 'soft development' of digital connectivity, climate, health and BRI aiming 'hard development' such as building prots and railways.
But, China announced the Global Development Initiative (GDI) which is like to compete in 'soft development'.
Digital development is likely to become competition zone between China's GDI and G7 PGII initiatives as focus will be on 5g telecoms, blockchain, data centers, etc.
Together with Africa, Pacific region will be one of battle ground of this battle for geopoliticall influence via develpment assistance. In other to counter China's growing presence, Japan, South Korea, Australia, New Zealand, and United States launched Blue Pacific Pact.
Some analysist are sceptical about G7 initiative as they see it as repackaging of the last year initiative of Build Back Better World which has to be repacked due to lack of congressional support in the USA.
It is not yet clear how new G7 initiative will relate to other similar initiatives, including Blue Dot Network (started by USA, Japan and Australia in 2019 Global Gateway scheme of EU to mobilise USD 340 bn Clean Grean Initative by Britain.
Thus, it is not clear how much fresh investement will go into G7 initiative. The success will answer the often posed question when West was criticising China's BRI initiative: 'What are you offering instead?
-
There are also overlaps with the eu’s Global Gateway scheme, launched in December to “mobilise” €300bn ($340bn) in infrastructure investment by 2027, and Britain’s Clean Green Initiative, unveiled a month earlier with a pledge of £3bn ($4.1bn) for sustainable infrastructure in developing countries.
-
t is a repackaging of an idea called Build Back Better World that was launched at the group’s summit last year.
-
the Partners in the Blue Pacific pact, aimed at offsetting Chinese influence in the Pacific islands.
-
by focusing on “soft” infrastructure where they have comparative advantages, Western countries aim to boost exports of their own technology and services in areas such as 5g telecoms, blockchain and clean energy.
-
the Global Development Initiative, which is expected to focus more on sustainable development.
-
Western officials say the scheme will not compete directly with the bri, which has focused on ports, railways and other “hard” infrastructure. Instead, it will try to play to the g7’s strengths by prioritising climate and energy security, digital connectivity, health and women’s equality.
-
the Partnership for Global Infrastructure and Investment (pgii)
-
On June 26th the rich democracies of the g7 unveiled a plan to mobilise $600bn of private and public investment in infrastructure in low- and middle-income countries over the next five years
-
And every time America criticised China’s “new Silk Road”, the riposte came: “What are you offering instead?”
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
Perhaps the labour market will regain some slack as Europe’s economy slows down. Soaring energy prices have soured the mood in recent weeks, as has a resurgence of covid. That would hardly be good news, except for hard-up employers—and those looking to catch a bit of downtime on a far-flung beach.
-
handling e-commerce packages for decent pay while listening to podcasts beats arriving at 5am to ask passengers whether they have packed any liquids in their carry-on.
-
“Everyone’s asking, where have they all gone?” pondered Tim Clark, the boss of Emirates airline, according to Bloomberg. “And the answer is always: Amazon.”
-
Poles and Bulgarians now find plenty of good jobs at home.
-
Unemployment in the euro area, at 6.6%, is at its lowest since the single currency was launched two decades ago. Some places have all but run out of workers: Germany’s jobless rate is just 2.8%.
-
But airports’ difficulties are not merely the result of local labour troubles.
-
Airports should have been prepared. Forecasting the number of travellers on a given day is not unreasonably complicated, given that they have bought tickets well beforehand.
-
Instead it sent the euro tanking (to near parity with the American dollar), making Greek tavernas and Baltic beaches irresistible.
-
For Europe, which attracts half the world’s international travellers, that ought to be a boon.
-
In no sector is the lack of staff so glaring as in air travel.
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
Like it or not, the world wants Japan, and Japan needs the world.
-
The country needs to quadruple the number of foreign workers by 2040 to sustain the government’s modest average growth target of 1.2%, according to a recent study by a group of Japanese think-tanks. (Without sustained investment in automation, the number would have to rise more than ten-fold.)
-
Japan has already lost a cohort of foreign students, the very people who often go on to become bridge-builders between countries.
-
Border closures have been popular: nearly 90% of Japanese approved when Kishida Fumio, Japan’s prime minister, tightened travel restrictions in response to the outbreak of the Omicron variant late last year.
-
Japanese nationals were largely free to come and go. Foreigners, even those with permanent residence, faced restrictions.
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
Notes for future research
Statistcs/numbers: 1 billion uses of TikTok
- user spend 50% longer on TikTok than on Instagram.
Engaging slogan by Tik-Tok - add to other slogans developed by Facebook, Goolge, etc.
-
HEADLINE How future of TikTok can determine the future of the integrated Internet?
EXCERPTS TIKTok saga will shape the future of the Internet. If TikTok is banned in the USA as a security risk, it could lead towards further disintegration of the Internet. In the same time, Chinese side has to be ready to accept higher scrutiny of TikTok algorithms and business models. By monitoring this policy issue we will monitor the future of integrated Internet.
SUMMARY
TikTok controversy, as the Economist put it, s a test of whether global business and the global internet can remain intact as us-China relations deteriorate.
Context for pressure on TikTok is geopolitics and forthcoming elections in the USA. There is a concern that TikTok could be used to influence eletions.
Is privacy protection real risk since most of TikTok data can be scraped as public data.
The real risk that concers US is a possibility of manipuating domestic audience by company which is in Chinese ownership. For examplea quarter of American users consider TikTok to be a news source.
TikTok algorithms that could be used for manipulation are developed mainly in Beijing.
TikTok can address the risk of shutting down by having data held by Oracle, as already happened during Trump administration, letting third parties inspect its algorithms, including showing the source code and allowing ongoing inspection.
According to the Economist: 'TikTok should be ultimately responsible to an independent board of its own, with members from outside China.'
China is likely to oppose this request for supervision of TikTok's algorithms. However, by doing so, China may make this companies shut down by Western authorities. It will be one of the key decisions and trade-offs with far-reaching consequences for global Internet that China will have to make.
-
If it refuses, the likely result is that TikTok—and more companies like it—will be locked out of the West altogether.
-
reluctant to cede any corporate control to foreigners.
-
classified content-recommendation algorithms as a key technology and may object to TikTok’s code being made available for dissection
-
TikTok should be ultimately responsible to an independent board of its own, with members from outside China
-
showing the source code and allowing ongoing inspection
-
to let third parties inspect its algorithm.
-
data are held by Oracle
-
Western countries might one day have to shut TikTok down.
-
Because each user gets a personalised feed, tampering would be hard to spot.
-
But the app’s algorithm is nurtured in Beijing
-
A quarter of American users say they consider TikTok to be a news source.
-
it offers China to manipulate what the app’s vast foreign audience sees.
-
Most such information could be scraped from TikTok’s front end
-
risk is privacy
-
America often accuses China of copycat capitalism. Now the boot is on the other foot.
-
to reach $12bn this year and $23bn in 2024
-
user spends 50% longer on the app each day than the typical user spends on Instagram.
-
sign up its first 1bn users in half the time it took Facebook.
-
a test of whether global business and the global internet can remain intact as us-China relations deteriorate.
Test for integrated Internet
-
a security risk to the Chinese Communist Party’s enemies
-
storm in Congress
-
elections loom in America
-
the sunny app has a dark side
-
its 1bn-plus users
-
as “the last sunny corner on the internet”.
-
-
www.newyorker.com www.newyorker.com
-
But the predictable is as much a human need as are ruptures from the predictable.
-
to offer what is so beloved about rules, which is the increase of what Daston terms the “radius of predictability.”
-
Alice’s Wonderland is a place where the only rule is that the rules will keep changing.
-
Daston describes how, historically, sovereignty in Europe has been derived from a mix of “divine authority, the patriarchal power of the male head of household over his wife and children, and the power of the conqueror over the vanquished in war.”
-
Carl Schmitt’s definition of sovereignty as “the power to decide on the exception,”
-
Rules that allow no exception seem free of human frailty but alien, and unable to admit properly of complexity.
-
Rules that leave a ruler, or a judge, in charge of interpreting them feel at once humanized and corruptible.
-
In this way, the nonsense nested within the cadence of sense becomes vivid.
-
Algorithms, which were closely associated with reason, came to be valued as more ideal than error-prone human judgment.
-
Daston suggests that rules tend to succeed when they are also norms.
-
A computer algorithm is an example of a thin rule—long, perhaps, but intended to be deployed without the need of any human thought or intervention.
-
thin rules “aspire to be self-sufficient.”
-
they require interpretation, and because examples are given, and because they make room for all sorts of exceptions.
-
rules were derived from models:
-
Similarly, the Latin term regula connects both to straight planks used for measuring and building and to a model by which others are measured more metaphorically—the ruler of a nation, say.
-
Daston helps us see rules (and their neighbors, such as laws and regulations) through the concepts of thickness and thinness, paradigms and algorithms, failures
-
when reasoning as we would recognize it proves even minimally consequential.
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
The party can probably tighten security in its own internal networks. But governing in China, as elsewhere, is all about priorities. And continued surveillance over its own citizens will remain far more important to the authorities than protecting those citizens’ data.
-
the party’s competence.
-
The hashtag “data leak” was blocked on Weibo, a microblog, soon after news started to circulate. Discussion on WeChat, a messaging app, is also constrained.
-
“China is a dictatorial state but that does not mean the state can do anything it likes, because individuals are going to get a bit angry,”
-
the law is enforced less strictly on officialdom, and there is little evidence of any change.
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
The document is ridiculously broad. It says the state should “promote the culinary and gastronomic heritage” of Chile and recognise “spirituality as an essential element of the human being”. Everyone has a “right to sports”. Non-humans get a look in, too: the state “will promote an education based on empathy…for animals”.
-
-
rcrcconference.org rcrcconference.org
-
Title: Resolution on Safeguarding Humanitarian Data
Resolution on Safeguarding Humanitarian Data addresses the centrality of data for humanitarian actions. It reiterates previous initiatives and resolutions of the International Red Cross and Red Crescent Movement.
Here are a few key points from the resolution:
- unauthorised access to data could undermine the principle of impartiality of humanitarian organisations;
- states and other actors should respect humanitarian purpose of data;
- work on a digital emblem as a sign to identify data of humanitarian organisations;
- apply humanitarian principles online as it is done offline.
Data breaches put humanitThe data breach against the Movement discovered this year has highlighted a growing trend in cyber-operations targeted at humanitarian organisations. Data breaches risk causing severe consequences for the people those organisations serve – those that are already among the most vulnerable. The Movement will reaffirm its commitment and responsibility to implement data protection rules and cyber security measures. It will also emphasize the urgency of protecting humanitarian data and send a call from the Movement to States and other actors to protect humanitarian organisations online as they do offline.
-
n particular,expert communities, researchers and the privatesector –to work withand supporthumanitarian organizationsto develop or acquire the necessary tools
-
calls onStates and other actors to respect and protect impartial humanitarian organizations online as they do offline, including by safeguarding them from harmful cyber and information operations of any kind
-
n the datasecurity and personal data protection measures taken by Movement components
-
researching the technical feasibility of a digital emblem –namely,a distinctive emblemor signto identify the dataand digital infrastructure of organizationsand entities
-
impartial humanitarian organizations’ activities must be respectedand protected online as well as offline
-
may erode trustin impartial humanitarian organizations
-
that Statesand other actors respect the humanitarian purpose of such dataprocessing
-
mitigate the risk of data breaches,so that the peoplewhose data is being processed,
-
to adopt cyber security measures and data protection practices to
-
the Handbook on Data Protection in Humanitarian Actionand the Restoring Family Links Code of Conduct on Data Protection, and for protection frameworks,such as those in the Professional Standards for Protection Work
-
related to the safeguarding of people’s privacyanddignity and their safety
-
to trust humanitarian organizations with their personal data
-
impartial humanitarian organizations to process personaldata and sensitive non-personal data (humanitarian data) is critical toand an integral part oftheirability to deliver humanitarian activities
-
extraction of data being processed(forexample,collected, stored or transferred)by impartialhumanitarian organizationsundermines their work
-
-
www.rt.com www.rt.com
-
the broad refusal to recognize the right of the West to lead means there will no longer be a world order based on Western rules.
-
the specter of China looms – a systemic competitor to the West and, even better, an accomplice of ‘the Russians’.
-
the former third world is becoming more demanding and picky
-
it has now completely lost the desire to share its advantages.
-
former third world today have money, skills, and to some extent, technology.
-
it is difficult for the West to offer the leading countries of the rest of the world anything that would force them to radically change their positions.
-
And almost in parallel with the events in Europe, Modi participated in a virtual BRICS summit, and Argentina, it seems, together with Iran, has applied to join this emerging association.
-
it’s not about sympathy for Russia, but antipathy to the West.
-
The reason is not support for Russia’s actions, but opposition to the West’s attempts to impose its will on others, which often harms their own interests.
-
their irritation with the West as a whole
-
What did you expect would happen when you provoked the tiger?’
-
wars on the planet have never stopped, including in the last 30 years, and statements from the EU states about the era of ‘harmony and prosperity’ that Putin interrupted are perceived as both selfishness and hypocrisy
-
harsh methods and humanitarian consequences of the conflict do not elicit much sympathy from outside. In other words
-
few people approve of Russia’s actions in Ukraine
-
he Western media still has a near-monopoly on determining the picture of what is happening on a global scale.
-
no one has yet come close to the Western world in terms of well-being and comfort.
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
He called on nations to join China’s new Global Security Initiative and its Global Development Initiative, two loosely defined campaigns.
-
The country’s policies were “coercive,” its cyberoperations “malicious” and its rhetoric “confrontational.”
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
In the run-up to any Cop, negotiations are largely handled by technical specialists in the initial phases, with ministers typically getting involved at the end of talks.
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
This notion strongly reflects Japan’s long-standing philosophy of supporting self-help efforts for development cooperation and translates it into Africa’s context.
-
-
curator.diplomacy.edu curator.diplomacy.edu
-
The market is bigger and more visible than ever before, encompassing hundreds of companies selling surveillance tech globally. One of the industry’s top trade shows, ISS World, recently held a show in Prague, and it was bigger than ever on both the company and government delegation sides. Calls from every conceivable corner to regulate the industry internationally have largely failed. As a result, there is still little global transparency or accountability for abuse despite increased attention on the problem.
-
-
ec.europa.eu ec.europa.eu
-
A strengthened and more secure data sharing framework that clarifies ambiguity on liability and ownership when transferring data will protectpeopleand businesses;it will alsohelp build trust and acceptance in twinning technologies
-
Using standards to ensurethattwinning technologies and infrastructures are interoperable will also enabletheintegration of EU partnersin the implementationprocess
-
The EU must developa more strategic approach to international standardisation activities in relevant global formats.
-
EU policymakingshouldfurther exploit the useof digital solutions,such as digital twins, artificial intelligence for forecasting,ormodelling in impact assessments.
-
Social dialogue, investments for quality job creation, and timely development of partnerships between public employment services, trade unions, industry and educational institutions are key.
-
Green anddigital diplomacy and outreach,leveraging the power of regulation and standardisation and promoting EUvalues,should be stepped up.
-
Rules-based multilateralism and values-based international cooperation should be prioritised.
-
The work of the EU Observatory of Critical Technologiesand a periodic review process will be important in the context of current and future risks of (technological) strategic dependencies.
-
the role of the EU in shaping global standards, and the voice of EU companies in regional standard setting bodies, will remain key.
-
Data standards will play an important role in ensuring that the exponential increase in the volume from different origins and private data
-
Standardswill beimportant forenabling the twinning.
-
Further digitalisation, accelerated by COVID-19, will also affect conditions and patterns of work, as well as access tosocial protection.
-
will be fair or will not be
-
currently the richest 10% of Europeans emit per capita more than three timesas much as the rest of Europe’scitizens.50
-
This entails reorientingthetraditionalview ofeconomic progresstowards a more qualitative one evolving around wellbeing, resource efficiency, circularity,and regeneration.
-
Boese, V., et all (2022).Democracy Report2022: Autrocratization Changing Nature? Varieties of Democracy Institute, V-DEM
-
This is relevant, as the last 30 years of democratic progress has been eradicated46: the average level of global democracy in 2021 is down to its 1989 level.
-
pursuing a value-based approac
-
rivalriesbased on values and societal modelsare alsoexpected to grow.
-
n quantum computing 50% of the top companies are in the US, 40% in China and none in the EU. In 5G, China captures nearly 60% of external funding, the US 27%, Europe 11%. In artificial intelligence, the US captured 40%, Europe 12% and Asia (including China) 32%. In biotech in 2018–20, theUS spent $260 billion, Europe $42 billion, China $19 billion. McKinsey Global Institute (2022). Securing Europe’s future beyond energy.
-
the EU could meet 52% of lithium demand, 49% for nickel and 58% for cobalt in 2050 for electric mobility by recycling end-of-life batteries.
-
For instance, after 2040, recycling could be the EU’s major source of supply for most transition metals, together with the continued need for primary metals.
-
Beyondthe access to critical raw materials, the ability to setenvironmental and socialstandards, ensuring the sustainability ofmining, refining, and recyclingactivities, and production of energy, will be key in the new geopolitical context.
-
a 3500% increase in the use of lithium, akey component for electric mobility. Chile currently holds 40% of lithium deposits, while China hosts 45% of itsrefining facilitiesworldwide.
-
China alone accounts for 86% of the global supply of neodymium. Palladium is mostly provided by Russia (40%), and tantalum by the Democratic Republic of the Congo (33%).
-
EU’s own productionaccountsfor only 4% of the global supply chain of critical raw materials used in the production of digital equipment, such as palladium, tantalum,or neodymium.
-
the EU’sdependence on third countries, including China,for a number of critical raw materials is even greater than thaton Russia for fossil fuels
-
oaring energy and food pricesand related social implications, the potentialneed totemporarily increasetheuse of coal, further pressure on public finances,higher inflation rates, increased cyber risks,issues withsupply chains,andimpaired access to critical raw materialsand technologies.
-
igital twins will provide data to manage thediversification of products and use functional biodiversity to redesign pestcontrol
-
ood security or the greening of the sector, and while tacklingfood insecurity in low-income partner countries
-
In the new geopolitical context, the EU needsto reduce its dependence on import of feed, fertilisers,and otherinputs
-
Availability of anonymised data, smartappliances, as well asconsumer behaviour will enable targeted investments in renovations.
-
n the EU,thissector currently accounts for 40% of energy consumption, while 75% of the building stock is energy inefficient.3
-
Uptake of digital solutions by the industrial sectorrequires higher levels of technologicalreadiness and cybersecurity to protect the data of industrial processes and the integrity of their functioning.
-
Data-driven optimisation will help improve existing materials, develop greener alternatives,and prolong their lifetime.
-
Four energy-intensive industries –steel, cement, chemicals, pulp,and paper –account for around 70% of its total global CO2 emissions.
-
digital platforms will boost other options such as pooling and sharing.
-
The use of data from vehicles and their environment can optimise charging
-
'Energy-as-a-service'21and data-driven innovative energy services canchangethe way energy suppliers and consumers interact.
-
Digitalisationcan strengthen the EU’senergy security.
-