SlideShare a Scribd company logo
Charles Mok | GDPi, Stanford | Tech for Good Asia | March 25 2022
Tech for Good?
A look at tech in the real world — the good, the bad, and the
uncertain
Tech is good, right?
Google

2000-2015: “Don’t be evil”

2015: “Do the right thing”?
2011: Arab Spring
Tech’s bad rap…inside
…and outside
Case #1: Artificial Intelligence and Data
• Policy concerns:

• Privacy issues, including facial recognition

• Algorithmic regulations

• Becoming social credit 

• Data sovereignty 

• Ethical issues e.g. warfare

• US-China competition

• China 14th Five-Year Plan for National Economic and Social Development 中华⼈⺠共
和国国⺠经济和社会发展第⼗四个五年规划和2035年远景⽬标纲要

• Final report of National Security Commission on AI 

• Ref: 2022 AI Index, Institute for Human-centered AI, Stanford 

University

• Industrialisation of AI and mounting ethical concerns

Case #2: Blockchain and decentralisation
• Blockchain

• Cryptocurrency

• NFT

• CBDC - central bank digital currency

• Ref: Digital Currencies: The US, China, And The World At A Crossroads, 

Hoover Institution

• DAO — decentralized autonomous organization

• What’s really Web3?

• Decentralized, or not really?

• What’s beyond the hype?
Case 3: Metaverse
• What is a metaverse?

• No, it’s not a multi-verse

• Social media + games + AR + VR + NFT -
regulations?

• Just another hype?

• Yes, China will regulate

• Internet Information Service Deep Synthesis
Management Provisions (Draft for Comment) –
Jan. 2022 (DigiChina translation)

互联⽹信息服务深度合成管理规定(征求意⻅
稿)
The Ukraine revelation
• Hackers and cyberwar

• Big tech exit Russia

• Meanwhile, TikTok, Hikvision…

• Remove .ru DNS?

• Clearview AI: Facial 

recognition of Russian 

soldiers
What will the future Internet be like?
• Post-COVID implications

• Social credit

• The Splinternet

• Surveillance and censorship

• A free, open, secure and trusted
Internet no more? Freedom on the Net 2021

https://freedomhouse.org/report/freedom-net/2021/global-drive-control-big-tech


Charles Mok

Visiting Scholar, Global Digital Policy
Incubator, Cyber Policy Center, Stanford
University

Director, Tech for Good Asia

Twitter: @charlesmok 

Facebook: CharlesMokO
ffi
ce

LInkedIn: charlesmok

More Related Content

What's hot

Digital Reasoning at AirSummit 2014
Digital Reasoning at AirSummit 2014Digital Reasoning at AirSummit 2014
Digital Reasoning at AirSummit 2014
Marten den Haring
 
MANYLAWS : EU-Wide Legal Text Mining Using Big Data Infrastructures
 MANYLAWS : EU-Wide Legal Text Mining Using Big Data Infrastructures MANYLAWS : EU-Wide Legal Text Mining Using Big Data Infrastructures
MANYLAWS : EU-Wide Legal Text Mining Using Big Data Infrastructures
Yannis Charalabidis
 
Mathews blockchain presentation
Mathews blockchain presentationMathews blockchain presentation
Mathews blockchain presentation
Michael Mathews
 
An Internet of Governments
An Internet of GovernmentsAn Internet of Governments
An Internet of Governments
Robbie Mitchell
 
Towngas Infomation Security Week 2013 presentation
Towngas Infomation Security Week 2013 presentationTowngas Infomation Security Week 2013 presentation
Towngas Infomation Security Week 2013 presentation
Charles Mok
 
Democracy 2.0 - What can lawmakers learn from lean software development?
Democracy 2.0 - What can lawmakers learn from lean software development?Democracy 2.0 - What can lawmakers learn from lean software development?
Democracy 2.0 - What can lawmakers learn from lean software development?
Plural (think tank)
 
The securitization of online activism
The securitization of online activismThe securitization of online activism
The securitization of online activism
jwilso
 
DeepFakes: pro & contra of democratic order
DeepFakes: pro & contra of democratic order DeepFakes: pro & contra of democratic order
DeepFakes: pro & contra of democratic order
Vitaliy Goncharuk
 
Crowdsourcing & ethics: a few thoughts and refences.
Crowdsourcing & ethics: a few thoughts and refences. Crowdsourcing & ethics: a few thoughts and refences.
Crowdsourcing & ethics: a few thoughts and refences.
Matthew Lease
 
On the Political Economy of Big Data: Some Ethical Considerations
On the Political Economy of Big Data: Some Ethical ConsiderationsOn the Political Economy of Big Data: Some Ethical Considerations
On the Political Economy of Big Data: Some Ethical Considerations
David Bieri
 
Blockchain and AI
Blockchain and AIBlockchain and AI
Blockchain and AI
Ahmed Banafa
 
The Internet Of Things
The Internet Of ThingsThe Internet Of Things
The Internet Of Things
Shivangi Dubey
 
Identity of the Blockchain: Perils and Promise
Identity of the Blockchain: Perils and PromiseIdentity of the Blockchain: Perils and Promise
Identity of the Blockchain: Perils and Promise
Christopher Allen
 
Open Data Institute presentation of european context
Open Data Institute presentation of european contextOpen Data Institute presentation of european context
Open Data Institute presentation of european context
liberTIC
 
Digital revolution with Cloud computing
Digital revolution with Cloud computingDigital revolution with Cloud computing
Digital revolution with Cloud computing
Tarry Singh
 
Internet Governance by Its History (1966-2000)
Internet Governance by Its History (1966-2000)Internet Governance by Its History (1966-2000)
Internet Governance by Its History (1966-2000)
Jeremy Pesner
 
Big Data is today
Big Data is todayBig Data is today
Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550 Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550
Brian Rowe
 
Civic Engagement from the Dorm to Dakar
Civic Engagement from the Dorm to Dakar Civic Engagement from the Dorm to Dakar
Civic Engagement from the Dorm to Dakar
Kara Andrade
 
Infoactivism - Michł Mach
Infoactivism - Michł MachInfoactivism - Michł Mach
Infoactivism - Michł Mach
centrumcyfrowe
 

What's hot (20)

Digital Reasoning at AirSummit 2014
Digital Reasoning at AirSummit 2014Digital Reasoning at AirSummit 2014
Digital Reasoning at AirSummit 2014
 
MANYLAWS : EU-Wide Legal Text Mining Using Big Data Infrastructures
 MANYLAWS : EU-Wide Legal Text Mining Using Big Data Infrastructures MANYLAWS : EU-Wide Legal Text Mining Using Big Data Infrastructures
MANYLAWS : EU-Wide Legal Text Mining Using Big Data Infrastructures
 
Mathews blockchain presentation
Mathews blockchain presentationMathews blockchain presentation
Mathews blockchain presentation
 
An Internet of Governments
An Internet of GovernmentsAn Internet of Governments
An Internet of Governments
 
Towngas Infomation Security Week 2013 presentation
Towngas Infomation Security Week 2013 presentationTowngas Infomation Security Week 2013 presentation
Towngas Infomation Security Week 2013 presentation
 
Democracy 2.0 - What can lawmakers learn from lean software development?
Democracy 2.0 - What can lawmakers learn from lean software development?Democracy 2.0 - What can lawmakers learn from lean software development?
Democracy 2.0 - What can lawmakers learn from lean software development?
 
The securitization of online activism
The securitization of online activismThe securitization of online activism
The securitization of online activism
 
DeepFakes: pro & contra of democratic order
DeepFakes: pro & contra of democratic order DeepFakes: pro & contra of democratic order
DeepFakes: pro & contra of democratic order
 
Crowdsourcing & ethics: a few thoughts and refences.
Crowdsourcing & ethics: a few thoughts and refences. Crowdsourcing & ethics: a few thoughts and refences.
Crowdsourcing & ethics: a few thoughts and refences.
 
On the Political Economy of Big Data: Some Ethical Considerations
On the Political Economy of Big Data: Some Ethical ConsiderationsOn the Political Economy of Big Data: Some Ethical Considerations
On the Political Economy of Big Data: Some Ethical Considerations
 
Blockchain and AI
Blockchain and AIBlockchain and AI
Blockchain and AI
 
The Internet Of Things
The Internet Of ThingsThe Internet Of Things
The Internet Of Things
 
Identity of the Blockchain: Perils and Promise
Identity of the Blockchain: Perils and PromiseIdentity of the Blockchain: Perils and Promise
Identity of the Blockchain: Perils and Promise
 
Open Data Institute presentation of european context
Open Data Institute presentation of european contextOpen Data Institute presentation of european context
Open Data Institute presentation of european context
 
Digital revolution with Cloud computing
Digital revolution with Cloud computingDigital revolution with Cloud computing
Digital revolution with Cloud computing
 
Internet Governance by Its History (1966-2000)
Internet Governance by Its History (1966-2000)Internet Governance by Its History (1966-2000)
Internet Governance by Its History (1966-2000)
 
Big Data is today
Big Data is todayBig Data is today
Big Data is today
 
Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550 Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550
 
Civic Engagement from the Dorm to Dakar
Civic Engagement from the Dorm to Dakar Civic Engagement from the Dorm to Dakar
Civic Engagement from the Dorm to Dakar
 
Infoactivism - Michł Mach
Infoactivism - Michł MachInfoactivism - Michł Mach
Infoactivism - Michł Mach
 

Similar to HKU Tech for Good.pdf

HKU Tech for Good year2.pdf
HKU Tech for Good year2.pdfHKU Tech for Good year2.pdf
HKU Tech for Good year2.pdf
Charles Mok
 
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology FragmentationDigital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Charles Mok
 
20220301 digital person v15
20220301 digital person v1520220301 digital person v15
20220301 digital person v15
ISSIP
 
Threading it all together – Q2 Tech Trends
Threading it all together – Q2 Tech TrendsThreading it all together – Q2 Tech Trends
Threading it all together – Q2 Tech Trends
Katie Harbath
 
CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin
OCTF Industry Engagement
 
La #blockchain au #CES2018
La #blockchain au #CES2018La #blockchain au #CES2018
La #blockchain au #CES2018
Vidal Chriqui
 
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
CODE BLUE
 
The art and science of data-driven journalism
The art and science of data-driven journalism The art and science of data-driven journalism
The art and science of data-driven journalism
Alexander Howard
 
Chinese Digital Repression
Chinese Digital RepressionChinese Digital Repression
Chinese Digital Repression
Charles Mok
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
Charles Mok
 
March 2012 SVB TechCrawl NYC
March 2012 SVB TechCrawl NYCMarch 2012 SVB TechCrawl NYC
March 2012 SVB TechCrawl NYC
Doreen Bloch
 
QUT Regulating Disinformation with AI Marsden 2024
QUT Regulating Disinformation with AI Marsden 2024QUT Regulating Disinformation with AI Marsden 2024
QUT Regulating Disinformation with AI Marsden 2024
Chris Marsden
 
Blockchain Latam: Bitcoin within context of industry transformation
Blockchain Latam: Bitcoin within context of industry transformationBlockchain Latam: Bitcoin within context of industry transformation
Blockchain Latam: Bitcoin within context of industry transformation
Alan Colmenares
 
Disruptive Technology, Philanthropy & Civil Society
Disruptive Technology, Philanthropy & Civil SocietyDisruptive Technology, Philanthropy & Civil Society
Disruptive Technology, Philanthropy & Civil Society
rhoddavies1
 
AI and its Effects on the Global World Order
AI and its Effects on the Global World OrderAI and its Effects on the Global World Order
AI and its Effects on the Global World Order
The Future Society
 
[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)
Adam Thierer
 
GK NU CS 101 Session 1B (1).ppt
GK NU CS 101 Session 1B (1).pptGK NU CS 101 Session 1B (1).ppt
GK NU CS 101 Session 1B (1).ppt
PiyushRanjan269184
 
Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenience
Don Lovett
 
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdfWeek34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
PhngLinhTrn33
 
Judgement Day - Slovakia
Judgement Day  - SlovakiaJudgement Day  - Slovakia
Judgement Day - Slovakia
OCTF Industry Engagement
 

Similar to HKU Tech for Good.pdf (20)

HKU Tech for Good year2.pdf
HKU Tech for Good year2.pdfHKU Tech for Good year2.pdf
HKU Tech for Good year2.pdf
 
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology FragmentationDigital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
 
20220301 digital person v15
20220301 digital person v1520220301 digital person v15
20220301 digital person v15
 
Threading it all together – Q2 Tech Trends
Threading it all together – Q2 Tech TrendsThreading it all together – Q2 Tech Trends
Threading it all together – Q2 Tech Trends
 
CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin
 
La #blockchain au #CES2018
La #blockchain au #CES2018La #blockchain au #CES2018
La #blockchain au #CES2018
 
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
 
The art and science of data-driven journalism
The art and science of data-driven journalism The art and science of data-driven journalism
The art and science of data-driven journalism
 
Chinese Digital Repression
Chinese Digital RepressionChinese Digital Repression
Chinese Digital Repression
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
 
March 2012 SVB TechCrawl NYC
March 2012 SVB TechCrawl NYCMarch 2012 SVB TechCrawl NYC
March 2012 SVB TechCrawl NYC
 
QUT Regulating Disinformation with AI Marsden 2024
QUT Regulating Disinformation with AI Marsden 2024QUT Regulating Disinformation with AI Marsden 2024
QUT Regulating Disinformation with AI Marsden 2024
 
Blockchain Latam: Bitcoin within context of industry transformation
Blockchain Latam: Bitcoin within context of industry transformationBlockchain Latam: Bitcoin within context of industry transformation
Blockchain Latam: Bitcoin within context of industry transformation
 
Disruptive Technology, Philanthropy & Civil Society
Disruptive Technology, Philanthropy & Civil SocietyDisruptive Technology, Philanthropy & Civil Society
Disruptive Technology, Philanthropy & Civil Society
 
AI and its Effects on the Global World Order
AI and its Effects on the Global World OrderAI and its Effects on the Global World Order
AI and its Effects on the Global World Order
 
[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)
 
GK NU CS 101 Session 1B (1).ppt
GK NU CS 101 Session 1B (1).pptGK NU CS 101 Session 1B (1).ppt
GK NU CS 101 Session 1B (1).ppt
 
Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenience
 
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdfWeek34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
Week34_The Internet, Digital Media, and Media Convergence (Chapter2) (1).pdf
 
Judgement Day - Slovakia
Judgement Day  - SlovakiaJudgement Day  - Slovakia
Judgement Day - Slovakia
 

More from Charles Mok

Threats to the Internet
Threats to the Internet Threats to the Internet
Threats to the Internet
Charles Mok
 
Cyber Risks in Hong Kong
Cyber Risks in Hong KongCyber Risks in Hong Kong
Cyber Risks in Hong Kong
Charles Mok
 
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through CompulsionICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
Charles Mok
 
全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇
Charles Mok
 
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for DemocracyTechnology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
Charles Mok
 
APAC Data Center Infrastructure Observations
APAC Data Center Infrastructure ObservationsAPAC Data Center Infrastructure Observations
APAC Data Center Infrastructure Observations
Charles Mok
 
Technology, Data and Ethics
Technology, Data and EthicsTechnology, Data and Ethics
Technology, Data and Ethics
Charles Mok
 
全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇
Charles Mok
 
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
Charles Mok
 
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdfCensorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
Charles Mok
 
Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...
Charles Mok
 
Misinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldMisinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the World
Charles Mok
 
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and TrendsFrom Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
Charles Mok
 
From Crypto to Trust and Identity
From Crypto to Trust and IdentityFrom Crypto to Trust and Identity
From Crypto to Trust and Identity
Charles Mok
 
Have you AI'ed today? A Reality Check
Have you AI'ed today? A Reality CheckHave you AI'ed today? A Reality Check
Have you AI'ed today? A Reality Check
Charles Mok
 
The Trouble with "Fake News" Laws
The Trouble with "Fake News" LawsThe Trouble with "Fake News" Laws
The Trouble with "Fake News" Laws
Charles Mok
 
2020-21 Budget -- New measures on I&T
2020-21 Budget -- New measures on I&T 2020-21 Budget -- New measures on I&T
2020-21 Budget -- New measures on I&T
Charles Mok
 
2020-21年財政預算案——創科項目重點
2020-21年財政預算案——創科項目重點2020-21年財政預算案——創科項目重點
2020-21年財政預算案——創科項目重點
Charles Mok
 
在數碼時代阻止假新聞與捍衛言論自由
在數碼時代阻止假新聞與捍衛言論自由在數碼時代阻止假新聞與捍衛言論自由
在數碼時代阻止假新聞與捍衛言論自由
Charles Mok
 
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Charles Mok
 

More from Charles Mok (20)

Threats to the Internet
Threats to the Internet Threats to the Internet
Threats to the Internet
 
Cyber Risks in Hong Kong
Cyber Risks in Hong KongCyber Risks in Hong Kong
Cyber Risks in Hong Kong
 
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through CompulsionICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
 
全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇
 
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for DemocracyTechnology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
 
APAC Data Center Infrastructure Observations
APAC Data Center Infrastructure ObservationsAPAC Data Center Infrastructure Observations
APAC Data Center Infrastructure Observations
 
Technology, Data and Ethics
Technology, Data and EthicsTechnology, Data and Ethics
Technology, Data and Ethics
 
全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇
 
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
 
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdfCensorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
 
Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...
 
Misinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldMisinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the World
 
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and TrendsFrom Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
 
From Crypto to Trust and Identity
From Crypto to Trust and IdentityFrom Crypto to Trust and Identity
From Crypto to Trust and Identity
 
Have you AI'ed today? A Reality Check
Have you AI'ed today? A Reality CheckHave you AI'ed today? A Reality Check
Have you AI'ed today? A Reality Check
 
The Trouble with "Fake News" Laws
The Trouble with "Fake News" LawsThe Trouble with "Fake News" Laws
The Trouble with "Fake News" Laws
 
2020-21 Budget -- New measures on I&T
2020-21 Budget -- New measures on I&T 2020-21 Budget -- New measures on I&T
2020-21 Budget -- New measures on I&T
 
2020-21年財政預算案——創科項目重點
2020-21年財政預算案——創科項目重點2020-21年財政預算案——創科項目重點
2020-21年財政預算案——創科項目重點
 
在數碼時代阻止假新聞與捍衛言論自由
在數碼時代阻止假新聞與捍衛言論自由在數碼時代阻止假新聞與捍衛言論自由
在數碼時代阻止假新聞與捍衛言論自由
 
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
Mistrust vs Misinformation: Fake News, AI and Privacy -- The Next Frontiers i...
 

Recently uploaded

How Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdfHow Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdf
HackersList
 
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
Toru Tamaki
 
Research Directions for Cross Reality Interfaces
Research Directions for Cross Reality InterfacesResearch Directions for Cross Reality Interfaces
Research Directions for Cross Reality Interfaces
Mark Billinghurst
 
What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024
Stephanie Beckett
 
Pigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdfPigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdf
Pigging Solutions
 
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-InTrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc
 
20240702 Présentation Plateforme GenAI.pdf
20240702 Présentation Plateforme GenAI.pdf20240702 Présentation Plateforme GenAI.pdf
20240702 Présentation Plateforme GenAI.pdf
Sally Laouacheria
 
20240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 202420240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 2024
Matthew Sinclair
 
Coordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar SlidesCoordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar Slides
Safe Software
 
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly DetectionAdvanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
Bert Blevins
 
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdfWhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
ArgaBisma
 
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdfINDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
jackson110191
 
Cookies program to display the information though cookie creation
Cookies program to display the information though cookie creationCookies program to display the information though cookie creation
Cookies program to display the information though cookie creation
shanthidl1
 
Mitigating the Impact of State Management in Cloud Stream Processing Systems
Mitigating the Impact of State Management in Cloud Stream Processing SystemsMitigating the Impact of State Management in Cloud Stream Processing Systems
Mitigating the Impact of State Management in Cloud Stream Processing Systems
ScyllaDB
 
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptxRPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
SynapseIndia
 
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Chris Swan
 
find out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challengesfind out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challenges
huseindihon
 
Quantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLMQuantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLM
Vijayananda Mohire
 
Measuring the Impact of Network Latency at Twitter
Measuring the Impact of Network Latency at TwitterMeasuring the Impact of Network Latency at Twitter
Measuring the Impact of Network Latency at Twitter
ScyllaDB
 
Comparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdfComparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdf
Andrey Yasko
 

Recently uploaded (20)

How Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdfHow Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdf
 
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
 
Research Directions for Cross Reality Interfaces
Research Directions for Cross Reality InterfacesResearch Directions for Cross Reality Interfaces
Research Directions for Cross Reality Interfaces
 
What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024
 
Pigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdfPigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdf
 
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-InTrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
 
20240702 Présentation Plateforme GenAI.pdf
20240702 Présentation Plateforme GenAI.pdf20240702 Présentation Plateforme GenAI.pdf
20240702 Présentation Plateforme GenAI.pdf
 
20240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 202420240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 2024
 
Coordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar SlidesCoordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar Slides
 
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly DetectionAdvanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
 
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdfWhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
 
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdfINDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
 
Cookies program to display the information though cookie creation
Cookies program to display the information though cookie creationCookies program to display the information though cookie creation
Cookies program to display the information though cookie creation
 
Mitigating the Impact of State Management in Cloud Stream Processing Systems
Mitigating the Impact of State Management in Cloud Stream Processing SystemsMitigating the Impact of State Management in Cloud Stream Processing Systems
Mitigating the Impact of State Management in Cloud Stream Processing Systems
 
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptxRPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptx
 
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
 
find out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challengesfind out more about the role of autonomous vehicles in facing global challenges
find out more about the role of autonomous vehicles in facing global challenges
 
Quantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLMQuantum Communications Q&A with Gemini LLM
Quantum Communications Q&A with Gemini LLM
 
Measuring the Impact of Network Latency at Twitter
Measuring the Impact of Network Latency at TwitterMeasuring the Impact of Network Latency at Twitter
Measuring the Impact of Network Latency at Twitter
 
Comparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdfComparison Table of DiskWarrior Alternatives.pdf
Comparison Table of DiskWarrior Alternatives.pdf
 

HKU Tech for Good.pdf

  • 1. Charles Mok | GDPi, Stanford | Tech for Good Asia | March 25 2022 Tech for Good? A look at tech in the real world — the good, the bad, and the uncertain
  • 2. Tech is good, right? Google
 2000-2015: “Don’t be evil”
 2015: “Do the right thing”? 2011: Arab Spring
  • 5. Case #1: Artificial Intelligence and Data • Policy concerns: • Privacy issues, including facial recognition • Algorithmic regulations • Becoming social credit • Data sovereignty • Ethical issues e.g. warfare • US-China competition • China 14th Five-Year Plan for National Economic and Social Development 中华⼈⺠共 和国国⺠经济和社会发展第⼗四个五年规划和2035年远景⽬标纲要 • Final report of National Security Commission on AI • Ref: 2022 AI Index, Institute for Human-centered AI, Stanford 
 University • Industrialisation of AI and mounting ethical concerns

  • 6. Case #2: Blockchain and decentralisation • Blockchain • Cryptocurrency • NFT • CBDC - central bank digital currency • Ref: Digital Currencies: The US, China, And The World At A Crossroads, 
 Hoover Institution • DAO — decentralized autonomous organization • What’s really Web3? • Decentralized, or not really? • What’s beyond the hype?
  • 7. Case 3: Metaverse • What is a metaverse? • No, it’s not a multi-verse • Social media + games + AR + VR + NFT - regulations? • Just another hype? • Yes, China will regulate • Internet Information Service Deep Synthesis Management Provisions (Draft for Comment) – Jan. 2022 (DigiChina translation)
 互联⽹信息服务深度合成管理规定(征求意⻅ 稿)
  • 8. The Ukraine revelation • Hackers and cyberwar • Big tech exit Russia • Meanwhile, TikTok, Hikvision… • Remove .ru DNS? • Clearview AI: Facial 
 recognition of Russian 
 soldiers
  • 9. What will the future Internet be like? • Post-COVID implications • Social credit • The Splinternet • Surveillance and censorship • A free, open, secure and trusted Internet no more? Freedom on the Net 2021
 https://freedomhouse.org/report/freedom-net/2021/global-drive-control-big-tech
  • 10. 
 Charles Mok Visiting Scholar, Global Digital Policy Incubator, Cyber Policy Center, Stanford University Director, Tech for Good Asia Twitter: @charlesmok 
 Facebook: CharlesMokO ffi ce
 LInkedIn: charlesmok