What issues, topics, and ideas do you want to hear discussed at GCCS-Unplugged? Here you can see some of the suggested sessions. Although the majority of the schedule will still be created on site during the event, the most popular events from this forum will become the first sessions in the morning.
We live in an information society. We rarely think about the consequences and solutions. In this session we focus on issues for the information society: security, privacy, dominance, differences in civil liberties, economic potential. What are the main threats coming towards us and how should we deal with them?
Billions of people, primarily in the Global South, remain without access to the Internet. This has significant implications for economic growth and the protection of socioeconomic, civil and political rights. How can such access to the Internet be facilitated in a secure manner? What incentives do such actors require to take up the challenge of providing access to those who remain unconnected?
As increasing digital threats emerged particularly to journalists and media actors on Internet, UNESCO wants to trigger discussion on the challenges: What are major digital threats to journalists on Internet? What are initiatives and policy recommendations to address digital safety?
Currently internet is broken. With the evolution of Internet of things, millions of devices and users are connected to the internet. There is a need to figure out the broken policies and come up with new and sustainable policies that address the current demand for internet usage for the next generation Internet architecture.
Communication and collaboration software is a domain that needs external exposure, but also needs security and privacy. Current offerings focus on availability and price, rather than security and privacy. What solutions that cover both do exist? What open source groupware and collaboration solutions work?
What legal framework should be applied to international politics through cyber security and offensive tactics? Should governments limit themselves by international law when building their arsenal, and how far should transparency go? What role do human rights play in geopolitics trough online sanctions? Can freedom of the net be limited to put pressure on rogue regimes?
What technological people can do to make cyber security more transparant. One of the problems of the security debate, but also the privacy debate is that most people don’t have a clue about how their devices work and how their data is being processed by 3rd parties. How can we lift the hood of our devices and make people aware of what happens with their data?
It seems that governments do not consume the open data they publish. For a developer simply downloading data from an open data portal should be easy. However, developers in various places are running into the same problems with government open data portals. Broken links, not being able to track revision history, no bulk downloads. How can we fix this?
In discussions about security versus privacy we often see that they are considered to be opposites, but also two sides of the same coin. Interestingly the same can be said about copyright protection versus innovation. What will happen in a digital world without copyright protection? Can copyright on internet content be replaced by something else? Or should we abandon it?
In 2013, The Publeaks Foundation and a large number of Dutch media outlets launched Publeaks.nl, a website for people to leak documents to the media securely and anonymously. Since then, a number projects have been launched based on the Publeaks Method: AfriLeaks, WildLeaks, Sourcesure and MexicoLeaks. How do these platforms work? What methods, software and hardware is used? What digital skills are needed from the journalists?
As technology evolves, governments will inevitably try to use new technologies for the purpose of law enforcement. The use of this technology often conflicts with the existing legal framework. The Dutch government will soon announce a proposal to grant the Dutch law enforcement agencies the authority to hack into computers. What will be the legal issues? And what are the unintended consequences? And what does this mean for cyber-security in general?
To protect online freedom, Internet intermediaries like search engine, ISPs (Internet-service providers) and social media play a crucial role. It remains a challenge to explore: What are gaps and challenges of legal frame frameworks, and good practices and initiatives related to Intermediaries?
The rise of open data in the public sector has sparked innovation, efficiency, and economic development. More and more national and local governments are making their foray into the field with CDO’s, policies and open data portals. Moving beyond parking spots and public toilets, open data is also an opportunity to reimagine the relationship between citizens and government. What does it take to scale this up, both nationally and locally?