You are here: Home
112 items matching your search terms.
Filter the results.
Item type



















New items since



Sort by relevance · date (newest first) · alphabetically
Blog Entry Call for Comments: Model Security Standards for the Indian Fintech Industry
by Pranav M B published Dec 16, 2019 last modified Dec 16, 2019 01:16 PM — filed under: , , , ,
Located in Internet Governance
Blog Entry Automated Facial Recognition Systems (AFRS): Responding to Related Privacy Concerns
by Arindrajit Basu, Siddharth Sonkar published Jan 02, 2020 — filed under: , , ,
Arindrajit Basu and Siddharth Sonkar have co-written this blog as the second of their three-part blog series on AI Policy Exchange under the parent title: Is there a Reasonable Expectation of Privacy from Data Aggregation by Automated Facial Recognition Systems?
Located in Internet Governance
Blog Entry Automated Facial Recognition Systems and the Mosaic Theory of Privacy: The Way Forward
by Arindrajit Basu, Siddharth Sonkar published Jan 02, 2020 — filed under: , , ,
Arindrajit Basu and Siddharth Sonkar have co-written this blog as the third of their three-part blog series on AI Policy Exchange under the parent title: Is there a Reasonable Expectation of Privacy from Data Aggregation by Automated Facial Recognition Systems?
Located in Internet Governance
European Summer School on Internet Governance
by Admin published Jul 23, 2019 — filed under: , ,
The 13th European Summer School on Internet Governance was held at Meissen in Germany from 13 - 20 July 2019. Akriti Bopanna attended the school. The event was organized by EuroSSIG.
Located in Internet Governance / News & Media
Blog Entry India is falling down the facial recognition rabbit hole
by Prem Sylvester and Karan Saini published Jul 25, 2019 — filed under: ,
Its use as an effective law enforcement tool is overstated, while the underlying technology is deeply flawed.
Located in Internet Governance / Blog
Blog Entry CIS Cybersecurity Series (Part 20) – Saumil Shah
by Purba Sarkar published Aug 30, 2014 last modified Sep 06, 2014 05:03 AM — filed under: , , ,
CIS interviews Saumil Shah, security expert, as part of the Cybersecurity Series.
Located in Internet Governance / Blog
Cyber Dialogue Conference 2014
by Prasad Krishna published Mar 27, 2014 last modified Apr 08, 2014 05:09 AM — filed under: , , ,
The Cyber Dialogue conference, presented by the Canada Centre for Global Security Studies at the Munk School of Global Affairs, University of Toronto, will convene an influential mix of global leaders from government, civil society, academia and private enterprise to participate in a series of facilitated public plenary conversations and working groups around cyberspace security and governance.
Located in News & Media
Cyber-Security in the Age of Smart Manufacturing
by Admin published Oct 02, 2018 — filed under: ,
Arindrajit Basu attended the event 'Cyber-security in the age of Smart Manufacturing.' The event 'BTS - CyberComm 2018' was organised by the Federation of Indian Chamber of Commerce & industry (FICCI) in association with Karnataka Innovation and Technology Society, and Government of Karnataka at The Lalit Ashok, Bengaluru on September 26, 2018.
Located in Internet Governance / News & Media
Blog Entry Budapest Convention and the Information Technology Act
by Vipul Kharbanda published Nov 20, 2018 last modified Nov 20, 2018 04:18 PM — filed under: ,
The Convention on Cybercrime adopted in Budapest (“Convention”) is the fist and one of the most important multilateral treaties addressing the issue of internet and computer crimes.
Located in Internet Governance / Blog
Blog Entry Cyberspace and External Affairs:A Memorandum for India Summary
by Arindrajit Basu and Elonnai Hickok published Nov 30, 2018 last modified Dec 01, 2018 04:10 AM — filed under: , ,
This memorandum seeks to summarise the state of the global debate in cyberspace; outline how India can craft it’s global strategic vision and finally, provides a set of recommendations for the MEA as they craft their cyber diplomacy strategy.
Located in Internet Governance / Blog