Suche senden
Hochladen
Ralf Bendrath Privacy Activism 2.0
•
Als PPT, PDF herunterladen
•
2 gefällt mir
•
549 views
Computers, Freedom and Privacy 2009
Folgen
From the June 4 session on "Online Activism around the world."
Weniger lesen
Mehr lesen
Technologie
News & Politik
Melden
Teilen
Melden
Teilen
1 von 32
Jetzt herunterladen
Empfohlen
Félix García Lainez - Curso 2014-15 2º Nivel Avanzado Inglés - EOI Huesca
Privacy in a Digital age
Privacy in a Digital age
Felix Garcia Lainez
This slidedeck was for an internal lunchtime discussion around the issue of privacy. Each speaker had about 6-8 minutes to speak. I was simply trying to understand what privacy was in the context of the increasingly social world we live in. My final thought was that there was no fixed definition of privacy and that context played a very important role.
Privacy & Elvis
Privacy & Elvis
Guy Stephens | @guy1067
Links to my Emerging Technology (IoT, Big Data, Cloud, etc.) and World History (East Asia, South Asia, Islam, Western etc.) uploads
Global inventory
Global inventory
Bob Marcus
A presentation from the W3C Track, WWW Conference April 2017, Perth.
Privacy Concerns related to Verifiable Claims
Privacy Concerns related to Verifiable Claims
David Wood
In the 21st century, data is infrastructure for our economy, just like roads. In this session, Jeni will talk about the big challenges of building a strong data infrastructure: challenges of equality of access, challenges of privacy and trust, and the technical challenges of discovery and interoperability.
The challenges of building a strong data infrastructure
The challenges of building a strong data infrastructure
Jeni Tennison
Slide for Regional Learnscope event
A Digital Identity
A Digital Identity
judigowing
An overview of three trends which are reshaping the research landscape: big data, open research and post-truth
Research Revolution: Big Data, Open Research and Post-Truth
Research Revolution: Big Data, Open Research and Post-Truth
Mark Carrigan
Links to my World History, Emerging Technology, and Travel Uploads
Global inventory of all my Slideshare Uploads
Global inventory of all my Slideshare Uploads
Bob Marcus
Empfohlen
Félix García Lainez - Curso 2014-15 2º Nivel Avanzado Inglés - EOI Huesca
Privacy in a Digital age
Privacy in a Digital age
Felix Garcia Lainez
This slidedeck was for an internal lunchtime discussion around the issue of privacy. Each speaker had about 6-8 minutes to speak. I was simply trying to understand what privacy was in the context of the increasingly social world we live in. My final thought was that there was no fixed definition of privacy and that context played a very important role.
Privacy & Elvis
Privacy & Elvis
Guy Stephens | @guy1067
Links to my Emerging Technology (IoT, Big Data, Cloud, etc.) and World History (East Asia, South Asia, Islam, Western etc.) uploads
Global inventory
Global inventory
Bob Marcus
A presentation from the W3C Track, WWW Conference April 2017, Perth.
Privacy Concerns related to Verifiable Claims
Privacy Concerns related to Verifiable Claims
David Wood
In the 21st century, data is infrastructure for our economy, just like roads. In this session, Jeni will talk about the big challenges of building a strong data infrastructure: challenges of equality of access, challenges of privacy and trust, and the technical challenges of discovery and interoperability.
The challenges of building a strong data infrastructure
The challenges of building a strong data infrastructure
Jeni Tennison
Slide for Regional Learnscope event
A Digital Identity
A Digital Identity
judigowing
An overview of three trends which are reshaping the research landscape: big data, open research and post-truth
Research Revolution: Big Data, Open Research and Post-Truth
Research Revolution: Big Data, Open Research and Post-Truth
Mark Carrigan
Links to my World History, Emerging Technology, and Travel Uploads
Global inventory of all my Slideshare Uploads
Global inventory of all my Slideshare Uploads
Bob Marcus
The Internet is under attack . Fundamental aspects of it are under pressure - things like truth, expertise, knowledge, sharing and privacy. Librarians have a key role to play in fighting back. Here's how.
Glyn Moody - Dark ages 2.0 - and a sniglet
Glyn Moody - Dark ages 2.0 - and a sniglet
glynmoody
Main Street Meet-Up Presentation given at Newark Patch, April 10, 2012 about social media and local business
2012 04-10 Main Street Meet-Up
2012 04-10 Main Street Meet-Up
Internet Marketing Muscle
How net neutrality laws are made (open Internet), unmade, implemented and regulated
Marsden Net Neutrality OII
Marsden Net Neutrality OII
Chris Marsden
Collective Intelligence
Collective Intelligence
Collective Intelligence
ChandniBhamra
Une Histoire de la Veille des Médias Sociaux: Passé, Présent, Futur
Attentio - Simon McDermott
Attentio - Simon McDermott
Influence People
A brief desription of collective intelligence...
Collective Intelligence
Collective Intelligence
Sonia Ghera
Sc po some-01
Sc po some-01
Fabrice Epelboin
Internet search/HFSE
Internet search/HFSE
dondonlau
About the World Wide Web. In brief, how it was concieved, how it began, where do we stand, how it will shape in coming years, and a conclusion. Credit to the original creators of the content (and taker of the images) whose names have escaped my memory. :-(
Welcome To The Www
Welcome To The Www
Murtaza Abbas
This presentation, given in both the Canberra and Adelaide Social Media conferences by Akolade, provides a view on the dangers and mitigations for privacy concerns when government agencies use social media
Privacy and social media for Australian governments
Privacy and social media for Australian governments
Craig Thomler
presentation, misleading websites, project, group work, script
Wikileaks script
Wikileaks script
043cyeung
This presentation was provided by William Marden of the New York Public Library during the NISO Virtual Conference, Information Freedom, Ethics and Integrity, held on Wednesday, April 18, 2018
Marden - Privacy in the 21st Century Why It Matters Now More Than Ever
Marden - Privacy in the 21st Century Why It Matters Now More Than Ever
National Information Standards Organization (NISO)
A presentation based on my blog post on crowds, clouds and crisis at http://blogs.msdn.com/disaster/
Crowds, Clouds and Crisis
Crowds, Clouds and Crisis
Gisli Olafsson
A presentation given in Taiwan to the Association of Digital Culture (www.adct.org.tw) about how social computing is changing the way disaster information management will be done.
Crowds, Clouds and Crisis
Crowds, Clouds and Crisis
guest66e9ced
Presentation
Presentation
NewMediaActivism
From Brandeis to Roe v. Wade, a brief history of a troublesome right.
Privacy and the Press
Privacy and the Press
Dan Kennedy
Are the Internet and the Web the same thing?: prima parte delle lezioni del corso indirizzato agli studenti del biennio, su come funziona il Web e come si utilizza il linguaggio HTML.
What is the Web? - parte 1
What is the Web? - parte 1
Anna Rita Colella
Digital Activism
Digital Activism
lootra
KURZTHESE: Reflections on the events leading to the decision for net neutrality in the European parliament. BESCHREIBUNG: For several years the debate about net neutrality is going on in the EU. For a long time nothing happened besides consultations after consultations until September 2013 the European Commission suddenly proposed a regulation that claims to complete the digital single market and thereby abolish net neutrality almost completely. With only a few months left till the european elections and a very tight time schedule for political debate a coalition of several european NGOs started the campaign SaveTheInternet.EU. Its goal was to get the public informed about this legislation and get them to join in the fight for an open and free internet. At the time of this talk we will now how the fight ended so its time to look back and learn. This talk will either tell the story of how we won or why we lost net neutrality in Europe.
re:publica 2014 - How We Won The Battle On Net Neutrality in Europe… and what...
re:publica 2014 - How We Won The Battle On Net Neutrality in Europe… and what...
Thomas Lohninger
Nach der erfolgreichen Abschaffung der Vorratsdatenspeicherung in Europa und Österreich hat der AKVorrat sich dazu entschlossen in die Offensive zu gehen. Seit letztem Dezember arbeiten wir daran die Idee einer Überwachungsstaat-Gesamtrechnung Umzusetzen. Dazu schreiben wir ein wissenschaftliches Konzept zur Evaluierung bestehender und geplanter Überwachungsgesetze – einen Werkzeugkasten zum Rückbau des Überwachungsstaates. https://11.netzpolitik.org/schedule/pecha-kucha/
G’schichten aus Österreich: Über den Kampf gegen Massen-Überwachung
G’schichten aus Österreich: Über den Kampf gegen Massen-Überwachung
Thomas Lohninger
The fight for net neutrality in the EU is waging for many years. Since ex-commissioner Neelie Kroes presented her infamous proposal to allow all forms of network discrimination in 2013 the USA have changed their course twice and finally implemented legal safeguards for net neutrality to protect the innovative potential of their digital economy. Other countries have already applied their existing net neutrality laws and could prevent violations of the principle with good results. Meanwhile in the global south millions of people protest against plans of massively violating net neutrality and argue that internet.org and similar zero-rating projects are “economic racism”. The EU will have non of it. In Europe all three institutions have agreed on a text for net neutrality that is a little bit like Schrodinger’s cat – it could allow protection against network discrimination or it could legalise it. So far we don’t know and even the politicians who will vote on it don’t. The text is written so badly, ambiguous and contradictory that only regulators and courts can give it real meaning in the future. Next month the European Parliament will have to vote. This talks tries to give an understanding of where we are, how we got there and which path we have to go forward. https://11.netzpolitik.org/schedule/schroedingers-net-neutrality/
SCHROEDINGER’S NET NEUTRALITY
SCHROEDINGER’S NET NEUTRALITY
Thomas Lohninger
Am 8. November waren wir in Stuttgart auf dem High Tech Summit der Landesregierung und haben erkärt wieso Netzneutralität wichtig für Innovation, Meinungsfreiheit und lokale Wirtschaft ist. Slides des Vortrags:
Was hat Netzneutralität mit Baden-Württemberg zu tun?
Was hat Netzneutralität mit Baden-Württemberg zu tun?
Thomas Lohninger
Weitere ähnliche Inhalte
Was ist angesagt?
The Internet is under attack . Fundamental aspects of it are under pressure - things like truth, expertise, knowledge, sharing and privacy. Librarians have a key role to play in fighting back. Here's how.
Glyn Moody - Dark ages 2.0 - and a sniglet
Glyn Moody - Dark ages 2.0 - and a sniglet
glynmoody
Main Street Meet-Up Presentation given at Newark Patch, April 10, 2012 about social media and local business
2012 04-10 Main Street Meet-Up
2012 04-10 Main Street Meet-Up
Internet Marketing Muscle
How net neutrality laws are made (open Internet), unmade, implemented and regulated
Marsden Net Neutrality OII
Marsden Net Neutrality OII
Chris Marsden
Collective Intelligence
Collective Intelligence
Collective Intelligence
ChandniBhamra
Une Histoire de la Veille des Médias Sociaux: Passé, Présent, Futur
Attentio - Simon McDermott
Attentio - Simon McDermott
Influence People
A brief desription of collective intelligence...
Collective Intelligence
Collective Intelligence
Sonia Ghera
Sc po some-01
Sc po some-01
Fabrice Epelboin
Internet search/HFSE
Internet search/HFSE
dondonlau
About the World Wide Web. In brief, how it was concieved, how it began, where do we stand, how it will shape in coming years, and a conclusion. Credit to the original creators of the content (and taker of the images) whose names have escaped my memory. :-(
Welcome To The Www
Welcome To The Www
Murtaza Abbas
This presentation, given in both the Canberra and Adelaide Social Media conferences by Akolade, provides a view on the dangers and mitigations for privacy concerns when government agencies use social media
Privacy and social media for Australian governments
Privacy and social media for Australian governments
Craig Thomler
presentation, misleading websites, project, group work, script
Wikileaks script
Wikileaks script
043cyeung
This presentation was provided by William Marden of the New York Public Library during the NISO Virtual Conference, Information Freedom, Ethics and Integrity, held on Wednesday, April 18, 2018
Marden - Privacy in the 21st Century Why It Matters Now More Than Ever
Marden - Privacy in the 21st Century Why It Matters Now More Than Ever
National Information Standards Organization (NISO)
A presentation based on my blog post on crowds, clouds and crisis at http://blogs.msdn.com/disaster/
Crowds, Clouds and Crisis
Crowds, Clouds and Crisis
Gisli Olafsson
A presentation given in Taiwan to the Association of Digital Culture (www.adct.org.tw) about how social computing is changing the way disaster information management will be done.
Crowds, Clouds and Crisis
Crowds, Clouds and Crisis
guest66e9ced
Presentation
Presentation
NewMediaActivism
From Brandeis to Roe v. Wade, a brief history of a troublesome right.
Privacy and the Press
Privacy and the Press
Dan Kennedy
Are the Internet and the Web the same thing?: prima parte delle lezioni del corso indirizzato agli studenti del biennio, su come funziona il Web e come si utilizza il linguaggio HTML.
What is the Web? - parte 1
What is the Web? - parte 1
Anna Rita Colella
Digital Activism
Digital Activism
lootra
Was ist angesagt?
(18)
Glyn Moody - Dark ages 2.0 - and a sniglet
Glyn Moody - Dark ages 2.0 - and a sniglet
2012 04-10 Main Street Meet-Up
2012 04-10 Main Street Meet-Up
Marsden Net Neutrality OII
Marsden Net Neutrality OII
Collective Intelligence
Collective Intelligence
Attentio - Simon McDermott
Attentio - Simon McDermott
Collective Intelligence
Collective Intelligence
Sc po some-01
Sc po some-01
Internet search/HFSE
Internet search/HFSE
Welcome To The Www
Welcome To The Www
Privacy and social media for Australian governments
Privacy and social media for Australian governments
Wikileaks script
Wikileaks script
Marden - Privacy in the 21st Century Why It Matters Now More Than Ever
Marden - Privacy in the 21st Century Why It Matters Now More Than Ever
Crowds, Clouds and Crisis
Crowds, Clouds and Crisis
Crowds, Clouds and Crisis
Crowds, Clouds and Crisis
Presentation
Presentation
Privacy and the Press
Privacy and the Press
What is the Web? - parte 1
What is the Web? - parte 1
Digital Activism
Digital Activism
Andere mochten auch
KURZTHESE: Reflections on the events leading to the decision for net neutrality in the European parliament. BESCHREIBUNG: For several years the debate about net neutrality is going on in the EU. For a long time nothing happened besides consultations after consultations until September 2013 the European Commission suddenly proposed a regulation that claims to complete the digital single market and thereby abolish net neutrality almost completely. With only a few months left till the european elections and a very tight time schedule for political debate a coalition of several european NGOs started the campaign SaveTheInternet.EU. Its goal was to get the public informed about this legislation and get them to join in the fight for an open and free internet. At the time of this talk we will now how the fight ended so its time to look back and learn. This talk will either tell the story of how we won or why we lost net neutrality in Europe.
re:publica 2014 - How We Won The Battle On Net Neutrality in Europe… and what...
re:publica 2014 - How We Won The Battle On Net Neutrality in Europe… and what...
Thomas Lohninger
Nach der erfolgreichen Abschaffung der Vorratsdatenspeicherung in Europa und Österreich hat der AKVorrat sich dazu entschlossen in die Offensive zu gehen. Seit letztem Dezember arbeiten wir daran die Idee einer Überwachungsstaat-Gesamtrechnung Umzusetzen. Dazu schreiben wir ein wissenschaftliches Konzept zur Evaluierung bestehender und geplanter Überwachungsgesetze – einen Werkzeugkasten zum Rückbau des Überwachungsstaates. https://11.netzpolitik.org/schedule/pecha-kucha/
G’schichten aus Österreich: Über den Kampf gegen Massen-Überwachung
G’schichten aus Österreich: Über den Kampf gegen Massen-Überwachung
Thomas Lohninger
The fight for net neutrality in the EU is waging for many years. Since ex-commissioner Neelie Kroes presented her infamous proposal to allow all forms of network discrimination in 2013 the USA have changed their course twice and finally implemented legal safeguards for net neutrality to protect the innovative potential of their digital economy. Other countries have already applied their existing net neutrality laws and could prevent violations of the principle with good results. Meanwhile in the global south millions of people protest against plans of massively violating net neutrality and argue that internet.org and similar zero-rating projects are “economic racism”. The EU will have non of it. In Europe all three institutions have agreed on a text for net neutrality that is a little bit like Schrodinger’s cat – it could allow protection against network discrimination or it could legalise it. So far we don’t know and even the politicians who will vote on it don’t. The text is written so badly, ambiguous and contradictory that only regulators and courts can give it real meaning in the future. Next month the European Parliament will have to vote. This talks tries to give an understanding of where we are, how we got there and which path we have to go forward. https://11.netzpolitik.org/schedule/schroedingers-net-neutrality/
SCHROEDINGER’S NET NEUTRALITY
SCHROEDINGER’S NET NEUTRALITY
Thomas Lohninger
Am 8. November waren wir in Stuttgart auf dem High Tech Summit der Landesregierung und haben erkärt wieso Netzneutralität wichtig für Innovation, Meinungsfreiheit und lokale Wirtschaft ist. Slides des Vortrags:
Was hat Netzneutralität mit Baden-Württemberg zu tun?
Was hat Netzneutralität mit Baden-Württemberg zu tun?
Thomas Lohninger
Eine Einführung in netzpolitischen Diskurs & Praxis im Rahmen einer Ringvorlesung.
Netzpolitik - Die Machtfrage im Internet
Netzpolitik - Die Machtfrage im Internet
Thomas Lohninger
re:publica conference 2015 https://re-publica.de/session/netzneutralitaet-endspurt-europa Kurzthese: In einem Paukenschlag hat die amerikanische Regulierungsbehörde FCC dieses Jahr einen starken Schutz der Netzneutralität in den USA beschlossen. In Kanada, den Niederlanden, Indien und Slovenien geraten Verletzungen der Netzneutralität zusehends unter Beschuss. In all diesen Fällen hat sich die Zivilgesellschaft gegen die Interessen der Industrie durchgesetzt. Vor diesem Hintergrund beginnt in Europa die finale Verhandlungsrunde über den EU-weiten Schutz der Netzneutralität und entgegen dem globalen Trend ist man in Europa versucht Netzneutralität endgültig abzuschaffen. Beschreibung: Dank der Beteiligung von tausenden Bürgern auf der SaveTheInternet.eu Kampagne hat das Europa Parlament am 3. April 2014 für einen starken Schutz der Netzneutralität gestimmt. Die EU-Mitgliedsstaaten haben inzwischen aber einen extrem industriefreundlichen Vorschlag vorgelegt, welcher alle Formen von Verletzungen der Netzneutralität und Netzsperren legalisiert. Der zuständige Kommissar Günther Oettinger argumentiert komplett jenseits aller Fakten und setzt die netzneutralitätsfeindliche Politik seiner Vorgängerin Neelie Kroes fort. Dieser Vortrag gibt einen Einblick hinter die Kulissen der Verhandlungen zwischen den drei EU-Institutionen über das finale Gesetz zur Netzneutralität in Europa und vergleicht die Entwicklung mit dem globalen Trend.
Netzneutralität – Endspurt in Europa
Netzneutralität – Endspurt in Europa
Thomas Lohninger
Slides from Lennart Huizing for the workshop "Framing Data Retention" on 31c3 in 2014. see: https://events.ccc.de/congress/2014/wiki/Session:Framing_Data_Retention
31c3 "Framing Data Retention"
31c3 "Framing Data Retention"
Thomas Lohninger
Netzpolitik fh st-pölten
Netzpolitik fh st-pölten
Thomas Lohninger
„Geheimdienste kontrolliert man am besten, indem man ihre Gründung verhindert“ Im April 2015 hat die österreichische Bundesregierung einen Entwurf für ein "Polizeiliches Staatsschutzgesetz" vorgelegt. Damit soll ein neuer Inlandsgeheimdienst mit weitreichenden Überwachungsbefugnissen geschaffen werden. Unabhängige Kontrolle durch Gerichte und das Parlament ist nicht vorgesehen. Bereits in der Begutachtungsphase wurde das Gesetz massiv kritisiert. Der AKVorrat gab mit einer umfassenden Stellungnahme die wichtigsten Argumente vor. Der Widerstand gegen das Gesetz und die Kampagne des AKVorrat haben zwar zu mehrfacher Verschiebung der Beschlussfassung geführt, aber die Geheimdienstpläne der Regierung sind trotz mehr als 22.000 Unterzeichnerinnen und Unterzeichnern der Petition auf www.staatsschutz.at nach wie vor nicht vom Tisch. Der Talk bietet Einblicke, wie Geheimdienste in der Post-Snowden-Ära öffentlich und nicht öffentlich diskutiert werden. Wir zeigen die Geschichte von Österreich als Drehscheibe von internationalen Geheimdienstaktivitäten. Die aktuellen Pläne der Regierung zur Schaffung eines Inlandsgeheimdienstes sind in diesem Kontext zu sehen. Der aktuelle Gesetzesvorschlag stattet Polizeibehörden mit Geheimdienstbefugnissen aus, die einer unabhängigen Kontrolle weitestgehend entzogen sind. In unserer Analyse stellen wir unsere Kritikpunkte in einen größeren Kontext, der der Idee einer Überwachungsgesamtrechnung folgt. Wir stellen unsere Kampagne vor, die auf zwei Säulen steht: Aktivismus und politisches Lobbying. Der Spagat zwischen beiden Polen ist nicht immer einfach, aber unbedingt nötig, um die Breite des Widerstandes gegen das Gesetz darzustellen. Der reicht von der Bischofskonferenz, über Amnesty International bis zu Arbeitnehmervertretungen. Die juristische Expertise des AKVorrat macht uns auch zu ernstzunehmenden Gesprächspartnern von Politikerinnen und Politikern. Thomas Lohninger und Werner Reiter vom AKVorrat Österreich zeichnen das Bild eines ereignisreichen Widerstands gegen die Einrichtung eines Inlandsgeheimdienstes inkl. Gehimdienstdosenschießen und dem Defacement der Kampagnenwebsite. Sie diskutieren Kampagneninstrumente und ihre Wirksamkeit; und vor allem, unter welchen Rahmenbedingungen polizeiliche Ermittlungen menschenrechtskonform gestaltet werden können. https://events.ccc.de/congress/2015/Fahrplan/events/7413.html
32c3: AKVorrat Österreich – Der Kampf gegen unkontrollierte Massenüberwachung
32c3: AKVorrat Österreich – Der Kampf gegen unkontrollierte Massenüberwachung
Thomas Lohninger
1. Netzpolitischer Abend Österreich vom 3. Dezember 2015, 20:00 Metalab
1. Netzpolitischer Abend Wien Netzneutralität und Staatsschutzgesetz
1. Netzpolitischer Abend Wien Netzneutralität und Staatsschutzgesetz
Thomas Lohninger
Thomas telling stories from the war about digital rights campaigning in a fucked up world.
winning battles while losing ground - asymmetric campaigning for digital rights
winning battles while losing ground - asymmetric campaigning for digital rights
Thomas Lohninger
Vortrag zur Netzpolitik Szene Österreichs am FemCamp 2013 gemeinsam mit @mahriah
Netzpolitik in oesterreich
Netzpolitik in oesterreich
Thomas Lohninger
Cccamp14 nn-post tsm
Cccamp14 nn-post tsm
Thomas Lohninger
update on net neutrality in Europe with particular focus on the negotiations in the Council of the European Union about the Telecom Single Market regulation.
10 Jahre Netzpolitik - Ein Update zur Netzneutralität
10 Jahre Netzpolitik - Ein Update zur Netzneutralität
Thomas Lohninger
Netzneutralität: Stand der Diskussion seit September 2012 und im Hinblick auf die neue single Market Verordnung der EU Kommission. Erstmals gehalten auf der #DNP13 Recording gibt's hier: http://www.youtube.com/watch?v=1m279cJt5SU
Netzneutralität - state of the debate
Netzneutralität - state of the debate
Thomas Lohninger
Talk at 31st Chaos Communication Congress at Hamburg 2014. see: https://events.ccc.de/congress/2014/Fahrplan/events/6170.html Our talk will highlight the current debates surrounding net neutrality in Europe, the United States and other parts of the world. We will look at the results of the SaveTheInternet.eu campaign which was lunched a year ago on 30c3. We will discuss various legal protections for net neutrality, look closer at the experience of the Netherlands and we will give an overview of all important open ends of the debate. Since two years net neutrality is on the agenda of politicians world wide. These are important debates, as net neutrality became one of the central questions about our freedom on the internet. With different faces around the globe we see a trend towards more violations of the neutrality principle which the internet was founded upon. The efforts of telecommunication companies to find new ways to monetize their networks and us users within them are countered in some countries with legislation preventing this new business models. In 2010, after two years of preparation and a fierce battle, the Dutch parliament accepted a change to the Telecommunications Act which made net neutrality a principle that was protected by law. In this talk we will take stock after two years of legal protection of net neutrality in The Netherlands. Did it work and do the Dutch now have undiscriminated access to all services on the internet? Has the doomsday scenario of the providers, that subscriptions would become outrageously expensive, become reality? In which cases was the Dutch law enforced? Are there any loopholes in the Dutch implementation? If others are to fight for net neutrality, what are the pitfalls to avoid? And, on a more meta-level, is it enough? Will net neutrality protect your freedom to access websites and services, or do we need a broader type neutrality?
#31c3 net neutrality: days of future past
#31c3 net neutrality: days of future past
Thomas Lohninger
Seit Jahren nur in Fachzirkeln diskutiert gab es 2013 den Durchbruch für die Debatte um Netzneutralität. Mit der Ankündigung der Deutschen Telekom im Frühjahr, zukünftig auf Volumentarife umzusteigen und Partnerdienste priorisiert durchzulassen, wurde Netzneutralität eines der meistdiskutierten netzpolitischen Debatten des Jahres. Auf nationaler Ebene startete das Bundeswirtschaftsminsiterium eine Diskussion über eine Verordnung und auf EU-Ebene legte die Kommission einen Verordnungsvorschlag vor. Worum geht es in dieser Debatte, und wer sind die Stakeholder mit welchen Interessen? Was sind die Argumentationen, und wie sehen die konkreten politischen Prozesse auf nationaler und EU-Ebene dazu aus? Wie geht die Debatte weiter und was kann man selbst tun?
30c3 Der Kampf um Netzneutralität
30c3 Der Kampf um Netzneutralität
Thomas Lohninger
Einführung in praktischen Datenschutz und Datensicherheit für den VÖGB.
VÖGB "Gläserner Mensch"
VÖGB "Gläserner Mensch"
Thomas Lohninger
For the OSCE conference "Gaining a Digital Edge: Freedom of Expression" in Vienna 14. & 15. September 2016.
Why Net Neutrality matters for Freedom of Speech
Why Net Neutrality matters for Freedom of Speech
Thomas Lohninger
Andere mochten auch
(19)
re:publica 2014 - How We Won The Battle On Net Neutrality in Europe… and what...
re:publica 2014 - How We Won The Battle On Net Neutrality in Europe… and what...
G’schichten aus Österreich: Über den Kampf gegen Massen-Überwachung
G’schichten aus Österreich: Über den Kampf gegen Massen-Überwachung
SCHROEDINGER’S NET NEUTRALITY
SCHROEDINGER’S NET NEUTRALITY
Was hat Netzneutralität mit Baden-Württemberg zu tun?
Was hat Netzneutralität mit Baden-Württemberg zu tun?
Netzpolitik - Die Machtfrage im Internet
Netzpolitik - Die Machtfrage im Internet
Netzneutralität – Endspurt in Europa
Netzneutralität – Endspurt in Europa
31c3 "Framing Data Retention"
31c3 "Framing Data Retention"
Netzpolitik fh st-pölten
Netzpolitik fh st-pölten
32c3: AKVorrat Österreich – Der Kampf gegen unkontrollierte Massenüberwachung
32c3: AKVorrat Österreich – Der Kampf gegen unkontrollierte Massenüberwachung
1. Netzpolitischer Abend Wien Netzneutralität und Staatsschutzgesetz
1. Netzpolitischer Abend Wien Netzneutralität und Staatsschutzgesetz
winning battles while losing ground - asymmetric campaigning for digital rights
winning battles while losing ground - asymmetric campaigning for digital rights
Netzpolitik in oesterreich
Netzpolitik in oesterreich
Cccamp14 nn-post tsm
Cccamp14 nn-post tsm
10 Jahre Netzpolitik - Ein Update zur Netzneutralität
10 Jahre Netzpolitik - Ein Update zur Netzneutralität
Netzneutralität - state of the debate
Netzneutralität - state of the debate
#31c3 net neutrality: days of future past
#31c3 net neutrality: days of future past
30c3 Der Kampf um Netzneutralität
30c3 Der Kampf um Netzneutralität
VÖGB "Gläserner Mensch"
VÖGB "Gläserner Mensch"
Why Net Neutrality matters for Freedom of Speech
Why Net Neutrality matters for Freedom of Speech
Ähnlich wie Ralf Bendrath Privacy Activism 2.0
Brian Alseth's presentation to Information Privacy Law spring 2011 at Seattle Univeristy
Privacy reconsidered
Privacy reconsidered
Brian Rowe
Privacy in social media: so what?
Privacy in social media: so what?
Mathias Klang
✍️
Invasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian Media
Kelly Ratkovic
The Internet has a couple of characteristics that should affect the way we think about privacy.
Privacy and the Internet
Privacy and the Internet
Hans de Zwart
Privacy with Internet
Privacy with Internet
Mathias Klang
Chris Marsden, Oxford Internet Science JRA1 official workshop, 16 September 2014
Privacy, social networks and EU policy
Privacy, social networks and EU policy
Chris Marsden
A presentation held in 2nd Life during my EU parliament election campaign in May 2009.
Freedom or Control in Virtual Worlds
Freedom or Control in Virtual Worlds
Jyrki Kasvi
Data privacy in the social sector – Who cares? What about? Data has become ubiquitous. The world is rapidly digitising, and in our professional and private lives, more and more of our activities leave behind a trail of data. For the social sector this means great opportunities – in the 2013 Trendreport we looked at the uses of "Big Data for Good". But the risks of data mining are also coming into sharper focus, not least since the Wikileaks revelations in 2013. It's clear that in the next few years, those working in the social sector all over the world will have to give a lot of thought to issues of data privacy and transparency. What's less clear is what they think about these issues today. Does the need to protect beneficiaries' data even occur to an NGO in Brazil? How does a German foundation understand "transparency", and how does this differ from a Chinese foundation? Do Indonesian activists worry more about government surveillance or corporate data mining? This 40-page report, produced by the betterplace lab and enabled by Mozilla, is based on research conducted during Lab Around the World in China, Brazil, India, Indonesia and Germany. There we conducted interviews with people working in the social sector about their attitudes and behaviour around matters of data privacy, transparency and trust.
Privacy, Transparency and Trust in a Digital World
Privacy, Transparency and Trust in a Digital World
betterplace lab
Society vs Privacy: the impossible dilemma
Society vs Privacy: the impossible dilemma
Mathias Klang
Failure of Law - Social Media & Human Rights
Failure of Law - Social Media & Human Rights
Mathias Klang
Cyberterrorism can be in the form of Information attacks which are attempts to access, destroy, or alter information retained, processed, and distributed by computers and their networks and infrastructure attacks which are attempts to damage or disable critical services such as transportation, the distribution of electricity, gas and water, air traffic control and other critical government services (excelsiour, 2020). Hacktivism would be to use a computer to progress an agenda either a social or politically motive stance on a subject matter. The fundamental difference between cyberterrorism and hacktivism is that one wants to destroy (cyberterrorism) while the other (hacktivism)wants to persuade people to their cause or create a change. Technology has advanced these types of groups agenda farter and faster than ever before. There has always been dissenting views to what governments agendas or from what is the acceptable social norms for behavior. But now with the Internet (Technology) groups (mostly radical) can reach out to a greater audience perpetrate nefarious deeds with some form amenity. Groups can post fake news, statistics or false information to sway an audience to believe as they do. We only need to take our national security agencies word (or can we?) that state sponsored hackers infiltrated our last presidential election to sway our votes. In my opinion our governments have perpetuated the lack of freedoms that we the people are supposed to enjoy and, in many cases, still think we have but don’t. Governments have used for themselves and suppled countries that are under totalitarian rule the software to hack SSL inscription. SSL inscription is what is supposed to protect people privacy of communication over the internet. Communication such as Gmail or your private online discussions. State sponsored Trojan’s are used by the governments now to monitor normal peoples and suspects communications to investigate its own citizens -internet connections – watch and listen to online discussions they can even collect your passwords. People have always assumed that they have some basic privacy from the government. People should now assume that what they do on a computer is going to be known by whomever wishes to view or listen. When cybercrime expert Mikko Hypponen talked to an audience at TEDxBrussels, an independent event about how company based in Germany sold to the Egyptian government a set of tools for intercepting, at a very large scale, all the communication of the citizens of the country. This really started me to think about when this video was made -2011 a decade ago this was occurring. How far have we gone to invading privacy since then is the question? I don’t believe that Hacktivism is a subset of cyberterrorism. I do believe they need to walk a fine line. I can understand their existence with all the government intrusion over the last 20 years (see TED video). How else are ordinary p.
Cyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docx
whittemorelucilla
Michał Mach (CiviCRM) presentation about Infoactivism.
Infoactivism - Michł Mach
Infoactivism - Michł Mach
centrumcyfrowe
Web 2.0: 2001–Present Assignment Overview It is a truism in the study of human technology that any tool that gets the public’s attention will eventually be used for purposes entirely unforeseen by its inventor(s) and probably contrary to the general public interest. This has certainly been the case with information technologies and the Internet. E-mail is great, but spam is not. Online video of the grandkids is wonderful; online pornography accessible to little Johnny, not so much. Despite much breast beating, it is difficult to have the good without the bad—and even differentiating the good from the bad is often a matter of opinion. As Miles’ Law says, “Where you stand depends upon where you sit.” Recently, we have become so saturated with and dependent upon social media such as Facebook and Twitter that we have not always noticed the potential “dark side”—most specifically, the ability to use these tools not only to connect individuals in cyberspace but also to mobilize groups for action in the real world. One example is the “flash mob”—defined most generally as a group of people voluntarily assembled at a particular place and time for a particular purpose, coordinated through shared access to social media. This is not altogether a new invention—the telephone and, before that, the telegraph or even a good strong voice have been tools for assembling flash mobs in the past. But what has been recently discovered is how easy it is using modern social media, and how effective such mobs can be. As we said, whether or not you consider this to be a good development or a bad development depends a lot on how you evaluate the purpose of the mob. Public assemblies to install democracy in an authoritarian state sound pretty good; assembling gang members to break windows and burn cars would not strike most of us as all that great. Here is a sampling of different points of view on this general subject: Tavoulareas, E. (2011, August 22). Social media: The Jekyll & Hyde of media? Changemakers . Retrieved from http://www.changemakers.com/blog/social-media-jekyll-hyde-media Goodman, J. (2011, August 17). Debate over social media incitement as flash mobs strike. The Lede: Blogging the News. New York Times . Retrieved from http://thelede.blogs.nytimes.com/2011/08/17/debate-over-social-media-incitement-as-flash-mobs-strike/ Brennan, E. (2011, August 19). Flash Mobs – The dark side of social media revealed. Retrieved from http://www.i-policy.org/2011/08/flash-mobs-the-dark-side-of-social-media-revealed.html Lum, R. (2011) Spreading the happiness one flash mob at a time. CreativeGuerillaMarketin g. Retrieved from http://www.creativeguerrillamarketing.com/guerrilla-marketing/spreading-happiness-flash-mob-time/ Optional Reading Kelly, L. (2011, March 22). Advertising with flash mobs. JSNCafe . Retrieved from http://www.jsncafe.com/advertising-with-flash-mobs/ Heaney, F. (n.d.) The short life of flash mobs. Stay Free!. Retrieved from http://www.alternet.
Web 2.0 2001–PresentAssignment OverviewIt is a truism in the st.docx
Web 2.0 2001–PresentAssignment OverviewIt is a truism in the st.docx
davieec5f
Lecture By Antonio Casilli (Sociologist and Professor of Digital Humanities), September 18th 2015, Centennial Memorial Hall of the College of Liberal Arts, Yonsei University
Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...
Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...
Bodyspacesociety Blog
A Paranoid Peek at Social Media
A Paranoid Peek at Social Media
Mathias Klang
Internet Privacy Essay Internet Privacy Essays Internet Privacy Essay On Internet Privacy Internet and Personal Privacy Essay Essay on Internet Privacy Internet Privacy Essay Internet Privacy. Internet Privacy Essay Internet Privacy Analysis
Internet Privacy Essay
Internet Privacy Essay
College Papers Writing Service
As our lives are more and more digital, more and more personal data travels. Consumers are becoming aware & worry, especially in a context of scandals around privacy on internet. Brands have to change their approach to big data to establish a real trusting relationship with their consumers.
Privacy in the digital era
Privacy in the digital era
CHEMISTRY AGENCY
Privacy, prosumer law & competition workshop, 2 June EDPS
Privacy, prosumer law & competition workshop, 2 June EDPS
Chris Marsden
✍️
The Self-Invasion Of Privacy
The Self-Invasion Of Privacy
Diane Allen
Government & Social Media
Government & Social Media
Mathias Klang
Ähnlich wie Ralf Bendrath Privacy Activism 2.0
(20)
Privacy reconsidered
Privacy reconsidered
Privacy in social media: so what?
Privacy in social media: so what?
Invasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian Media
Privacy and the Internet
Privacy and the Internet
Privacy with Internet
Privacy with Internet
Privacy, social networks and EU policy
Privacy, social networks and EU policy
Freedom or Control in Virtual Worlds
Freedom or Control in Virtual Worlds
Privacy, Transparency and Trust in a Digital World
Privacy, Transparency and Trust in a Digital World
Society vs Privacy: the impossible dilemma
Society vs Privacy: the impossible dilemma
Failure of Law - Social Media & Human Rights
Failure of Law - Social Media & Human Rights
Cyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docx
Infoactivism - Michł Mach
Infoactivism - Michł Mach
Web 2.0 2001–PresentAssignment OverviewIt is a truism in the st.docx
Web 2.0 2001–PresentAssignment OverviewIt is a truism in the st.docx
Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...
Antonio Casilli, Yonsei University (Seoul, 198.09.2015) "Four theses on mass ...
A Paranoid Peek at Social Media
A Paranoid Peek at Social Media
Internet Privacy Essay
Internet Privacy Essay
Privacy in the digital era
Privacy in the digital era
Privacy, prosumer law & competition workshop, 2 June EDPS
Privacy, prosumer law & competition workshop, 2 June EDPS
The Self-Invasion Of Privacy
The Self-Invasion Of Privacy
Government & Social Media
Government & Social Media
Kürzlich hochgeladen
ICT role in 21 century education. How to ICT help in education
presentation ICT roal in 21st century education
presentation ICT roal in 21st century education
jfdjdjcjdnsjd
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
The Digital Insurer
Discord is a free app offering voice, video, and text chat functionalities, primarily catering to the gaming community. It serves as a hub for users to create and join servers tailored to their interests. Discord’s ecosystem comprises servers, each functioning as a distinct online community with its own channels dedicated to specific topics or activities. Users can engage in text-based discussions, voice calls, or video chats within these channels. Understanding Discord Servers Discord servers are virtual spaces where users congregate to interact, share content, and build communities. Servers may revolve around gaming, hobbies, interests, or fandoms, providing a platform for like-minded individuals to connect. Communication Features Discord offers a range of communication tools, including text channels for messaging, voice channels for real-time audio conversations, and video channels for face-to-face interactions. These features facilitate seamless communication and collaboration. What Does NSFW Mean? The acronym NSFW stands for “Not Safe For Work,” indicating content that may be inappropriate for professional or public settings. NSFW Content NSFW content encompasses material that is sexually explicit, violent, or otherwise graphic in nature. It often includes nudity, profanity, or depictions of sensitive topics.
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
UK Journal
BooK Now Call us at +918448380779 to hire a gorgeous and seductive call girl for sex. Take a Delhi Escort Service. The help of our escort agency is mostly meant for men who want sexual Indian Escorts In Delhi NCR. It should be noted that any impersonator will get 100 attention from our Young Girls Escorts in Delhi. They will assume the position of reliable allies. VIP Call Girl With Original Photos Book Tonight +918448380779 Our Cheap Price 1 Hour not available 2 Hours 5000 Full Night 8000 TAG: Call Girls in Delhi, Noida, Gurgaon, Ghaziabad, Connaught Place, Greater Kailash Delhi, Lajpat Nagar Delhi, Mayur Vihar Delhi, Chanakyapuri Delhi, New Friends Colony Delhi, Majnu Ka Tilla, Karol Bagh, Malviya Nagar, Saket, Khan Market, Noida Sector 18, Noida Sector 76, Noida Sector 51, Gurgaon Mg Road, Iffco Chowk Gurgaon, Rajiv Chowk Gurgaon All Delhi Ncr Free Home Deliver
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Delhi Call girls
These are the slides delivered in a workshop at Data Innovation Summit Stockholm April 2024, by Kristof Neys and Jonas El Reweny.
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Neo4j
Read about the journey the Adobe Experience Manager team has gone through in order to become and scale API-first throughout the organisation.
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
Radu Cotescu
Presentation from Melissa Klemke from her talk at Product Anonymous in April 2024
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Product Anonymous
With more memory available, system performance of three Dell devices increased, which can translate to a better user experience Conclusion When your system has plenty of RAM to meet your needs, you can efficiently access the applications and data you need to finish projects and to-do lists without sacrificing time and focus. Our test results show that with more memory available, three Dell PCs delivered better performance and took less time to complete the Procyon Office Productivity benchmark. These advantages translate to users being able to complete workflows more quickly and multitask more easily. Whether you need the mobility of the Latitude 5440, the creative capabilities of the Precision 3470, or the high performance of the OptiPlex Tower Plus 7010, configuring your system with more RAM can help keep processes running smoothly, enabling you to do more without compromising performance.
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
Principled Technologies
writing some innovation for development and search
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
sudhanshuwaghmare1
BooK Now Call us at +918448380779 to hire a gorgeous and seductive call girl for sex. Take a Delhi Escort Service. The help of our escort agency is mostly meant for men who want sexual Indian Escorts In Delhi NCR. It should be noted that any impersonator will get 100 attention from our Young Girls Escorts in Delhi. They will assume the position of reliable allies. VIP Call Girl With Original Photos Book Tonight +918448380779 Our Cheap Price 1 Hour not available 2 Hours 5000 Full Night 8000 TAG: Call Girls in Delhi, Noida, Gurgaon, Ghaziabad, Connaught Place, Greater Kailash Delhi, Lajpat Nagar Delhi, Mayur Vihar Delhi, Chanakyapuri Delhi, New Friends Colony Delhi, Majnu Ka Tilla, Karol Bagh, Malviya Nagar, Saket, Khan Market, Noida Sector 18, Noida Sector 76, Noida Sector 51, Gurgaon Mg Road, Iffco Chowk Gurgaon, Rajiv Chowk Gurgaon All Delhi Ncr Free Home Deliver
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Delhi Call girls
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
The Digital Insurer
In an era where artificial intelligence (AI) stands at the forefront of business innovation, Information Architecture (IA) is at the core of functionality. See “There’s No AI Without IA” – (from 2016 but even more relevant today) Understanding and leveraging how Information Architecture (IA) supports AI synergies between knowledge engineering and prompt engineering is critical for senior leaders looking to successfully deploy AI for internal and externally facing knowledge processes. This webinar be a high-level overview of the methodologies that can elevate AI-driven knowledge processes supporting both employees and customers. Core Insights Include: Strategic Knowledge Engineering: Delve into how structuring AI's knowledge base is required to prevent hallucinations, enable contextual retrieval of accurate information. This will include discussion of gold standard libraries of use cases support testing various LLMs and structures and configurations of knowledge base. Precision in Prompt Engineering: Learn the art of crafting prompts that direct AI to deliver targeted, relevant responses, thereby optimizing customer experiences and business outcomes. Unified Approach for Enhanced AI Performance: Explore the intersection of knowledge and prompt engineering to develop AI systems that are not only more responsive but also aligned with overarching business strategies. Guiding Principles for Implementation: Equip yourself with best practices, ethical guidelines, and strategic considerations for embedding these technologies into your business ecosystem effectively. This webinar is designed to empower business and technology leaders with the knowledge to harness the full potential of AI, ensuring their organizations not only keep pace with digital transformation but lead the charge. Join us to map a roadmap to fully leverage Information Architecture (IA) and AI chart a course towards a future where AI is a key pillar of strategic innovation and business success.
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
Digital Global Overview Report 2024 Slides presentation for Event presented in 2024 after compilation of data around last year.
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
hans926745
Details
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
Tech Trends Report 2024 Future Today Institute
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
hans926745
How to get Oracle DBA Job as fresher.
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
Remote DBA Services
Imagine a world where information flows as swiftly as thought itself, making decision-making as fluid as the data driving it. Every moment is critical, and the right tools can significantly boost your organization’s performance. The power of real-time data automation through FME can turn this vision into reality. Aimed at professionals eager to leverage real-time data for enhanced decision-making and efficiency, this webinar will cover the essentials of real-time data and its significance. We’ll explore: FME’s role in real-time event processing, from data intake and analysis to transformation and reporting An overview of leveraging streams vs. automations FME’s impact across various industries highlighted by real-life case studies Live demonstrations on setting up FME workflows for real-time data Practical advice on getting started, best practices, and tips for effective implementation Join us to enhance your skills in real-time data automation with FME, and take your operational capabilities to the next level.
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Safe Software
Slides from the presentation on Machine Learning for the Arts & Humanities seminar at the University of Bologna (Digital Humanities and Digital Knowledge program)
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Maria Levchenko
In this session, we will delve into strategic approaches for optimizing knowledge management within Microsoft 365, amidst the evolving landscape of Copilot. From leveraging automatic metadata classification and permission governance with SharePoint Premium, to unlocking Viva Engage for the cultivation of knowledge and communities, you will gain actionable insights to bolster your organization's knowledge-sharing initiatives. In this session, we will also explore how to facilitate solutions to enable your employees to find answers and expertise within Microsoft 365. You will leave equipped with practical techniques and a deeper understanding of how there is more to effective knowledge management than just enabling Copilot, but building actual solutions to prepare the knowledge that Copilot and your employees can use.
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Drew Madelung
The presentation explores the development and application of artificial intelligence (AI) from its inception to its current status in the modern world. The term "artificial intelligence" was first coined by John McCarthy in 1956 to describe efforts to develop computer programs capable of performing tasks that typically require human intelligence. This concept was first introduced at a conference held at Dartmouth College, where programs demonstrated capabilities such as playing chess, proving theorems, and interpreting texts. In the early stages, Alan Turing contributed to the field by defining intelligence as the ability of a being to respond to certain questions intelligently, proposing what is now known as the Turing Test to evaluate the presence of intelligent behavior in machines. As the decades progressed, AI evolved significantly. The 1980s focused on machine learning, teaching computers to learn from data, leading to the development of models that could improve their performance based on their experiences. The 1990s and 2000s saw further advances in algorithms and computational power, which allowed for more sophisticated data analysis techniques, including data mining. By the 2010s, the proliferation of big data and the refinement of deep learning techniques enabled AI to become mainstream. Notable milestones included the success of Google's AlphaGo and advancements in autonomous vehicles by companies like Tesla and Waymo. A major theme of the presentation is the application of generative AI, which has been used for tasks such as natural language text generation, translation, and question answering. Generative AI uses large datasets to train models that can then produce new, coherent pieces of text or other media. The presentation also discusses the ethical implications and the need for regulation in AI, highlighting issues such as privacy, bias, and the potential for misuse. These concerns have prompted calls for comprehensive regulations to ensure the safe and equitable use of AI technologies. Artificial intelligence has also played a significant role in healthcare, particularly highlighted during the COVID-19 pandemic, where it was used in drug discovery, vaccine development, and analyzing the spread of the virus. The capabilities of AI in healthcare are vast, ranging from medical diagnostics to personalized medicine, demonstrating the technology's potential to revolutionize fields beyond just technical or consumer applications. In conclusion, AI continues to be a rapidly evolving field with significant implications for various aspects of society. The development from theoretical concepts to real-world applications illustrates both the potential benefits and the challenges that come with integrating advanced technologies into everyday life. The ongoing discussion about AI ethics and regulation underscores the importance of managing these technologies responsibly to maximize their their benefits while minimizing potential harms.
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
Kürzlich hochgeladen
(20)
presentation ICT roal in 21st century education
presentation ICT roal in 21st century education
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Ralf Bendrath Privacy Activism 2.0
1.
Privacy Activism 2.0
lessons learned from the fight against data retention in Germany Ralf Bendrath www.vorratsdatenspeicherung.de bendrath.blogspot.com
2.
3.
4.
How did we
get there?
5.
The issue
6.
7.
At the beginning,
there was no plan (but a mailing list and a wiki)
8.
Participation
9.
10.
11.
12.
13.
Pop Culture
Viral Marketing
14.
15.
16.
17.
18.
19.
20.
21.
Get offline!
22.
23.
Results
24.
25.
26.
Internationalization
27.
„ Freedom not
Fear“
28.
Lessons Learned
29.
30.
31.
32.
Jetzt herunterladen