SlideShare a Scribd company logo
全球數位威權趨勢對台灣的挑戰和機遇
I am…
我是...
• Academic 學術:Stanford Cyber Policy Center 美國 史丹福⼤學 網絡政策中⼼

• Civil Society 公⺠社會:Internet Society 互聯網協會

• Public Service 公共服務:Former Legislative Council HK 前香港立法會

• Industry 業界:Founder HKNet (ISP) 網絡服務商 創業者
Digital Authoritarianism


數位威權
Global Digital Authoritarianism Trends
全球數位威權趨勢
• 以科技⽅式、⼿段、法律達致威權控制⼈⺠

• Mass Data Collection ⼤量數據蒐集

• Surveillance 監察

• Censorship 內容審查

• Disinformation 虛假資訊

• Laws 法律

Recommended for you

Fake News and the Trouble with Facebook
Fake News and the Trouble with FacebookFake News and the Trouble with Facebook
Fake News and the Trouble with Facebook

The document discusses the phenomenon of fake news, describing it as either stories aimed at generating profit through social media clicks or propaganda intended to influence political discourse. It notes fake news proliferated on social media platforms like Facebook and Twitter during the 2016 US election. While platforms have taken steps to curb fake news, it remains a challenge due to factors like users not checking sources and algorithms prioritizing engaging content. Potential solutions proposed include restricting anonymous users, offering alternative social media options, and reforming platforms' business models.

fake newsjournalismethics
Parisuhde ja perhe ppt
Parisuhde ja perhe pptParisuhde ja perhe ppt
Parisuhde ja perhe ppt
Eleanor Roosevelt Courage Project
Eleanor Roosevelt Courage ProjectEleanor Roosevelt Courage Project
Eleanor Roosevelt Courage Project

Eleanor Roosevelt was a courageous and active first lady who worked tirelessly for many causes. She joined numerous organizations, spoke out on important issues, and helped many citizens through her correspondence. Eleanor challenged racial segregation and advocated for women's and civil rights. She remained dedicated to helping others despite facing disagreement and criticism.

Mass Data Collection
⼤量數據蒐集
台灣
Mass Data Collection ⼤量數據蒐集
Where do all the data go? 數據去哪裡?
Surveillance 監察
Facial recognition 臉部辨識
Surveillance 監察
Governments requests for backdoors to encryption 政府要求平台解密
• 中國、美國、英國、歐盟、澳洲等,

各國政府都設法解開保障⽤⼾私隱的

點對點加密技術(E2EE)

• US (proposed EARN-IT Act), UK 

(proposed Online Safety Act), EU 

(proposed child protection law), 

and other laws in Australia etc.

• China already requires companies to

provide backdoors or key escrows to 

government for public security or 

intelligence gathering

Recommended for you

21 &55. Kiina kohtaa länsimaat & Kiinasta tulee mahtitekijä
21 &55. Kiina kohtaa länsimaat & Kiinasta tulee mahtitekijä21 &55. Kiina kohtaa länsimaat & Kiinasta tulee mahtitekijä
21 &55. Kiina kohtaa länsimaat & Kiinasta tulee mahtitekijä
Tietosuoja oppilaitoksen hallinnossa
Tietosuoja oppilaitoksen hallinnossaTietosuoja oppilaitoksen hallinnossa
Tietosuoja oppilaitoksen hallinnossa

Koulutus Rasekossa, 27.2.2020, Harto Pönkä, Innowise

tietosuojatietosuoja-asetusgdpr
Censorship 內容審查
Not only the content, it’s the solidarity 不僅是審查內容,是防⽌團結
2011 茉莉花運動
2022 河南村鎮銀⾏危機
Disinformation & Misinformation 虛假訊息
Fake News! 假新聞!
Laws 法律
In the name of cyber sovereignty, misinformation, cyber & national security…
以數位⾃主權、假消息、網絡安全和國家安全之名
• India 印度: Information Technology Act etc.

• Singapore 新加坡: POFMA (Protection from Online Falsehood & Manipulation Act),
Cybersecurity Act, Foreign Interference (Countermeasures) Act…

• Indonesia 印尼: series of law requiring platform registration and content deletion

• Cambodia 柬埔寨: National Internet Gateway

• Thailand 泰國: Computer Criminal Act, and new proposed China-styled
fi
rewall

• Vietnam 越南: Cybersecurity law

• Myanmar 緬甸: Cybersecurity law
Digital Authoritarianism is Splintering the Internet
數位威權正在分裂全球網絡

Recommended for you

Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...

This webinar covers: -The definitions of ‘data controller’ and ‘data processor’ under the GDPR.​ -The responsibilities and obligations of controllers and processors.​ -The data breach reporting responsibilities of controllers and processors.​ -The liability of, and penalties that may be imposed on, data processors and controllers.​ -The appointment of joint controllers and subcontracting processors The webinar can be found here https://www.youtube.com/watch?v=cyUPGGD3iVg&t=8s

gdprdata processorscontrollers
1031031 twnic研討會與談-網路與個資保護
1031031 twnic研討會與談-網路與個資保護1031031 twnic研討會與談-網路與個資保護
1031031 twnic研討會與談-網路與個資保護

參加2014年10月31日研討會與談的資料-說明網路隱私與資訊廣泛運用是衝突的、個資法第27條對於資訊安全的要求,以及個資法上自然人單純個人或家庭活動的解釋等。 本簡報僅代表個人意見!

個資法網路隱私權
What is big data
What is big dataWhat is big data
What is big data
巨量資料big datadata mining
Network Infrastructure and Geopolitics


網絡基建與地緣政治
Regional Network Infrastructure
從區域網絡基建看台灣
PLCN:台灣取代香港
South China Seas Dispute: Impact on Network Infrastructure
南海爭議對東亞網絡基建的影響
Risks for East Taiwan Coast?
台灣���海岸增加風險?

Recommended for you

【網路智慧新臺灣政策白皮書】構面一:基礎環境
【網路智慧新臺灣政策白皮書】構面一:基礎環境【網路智慧新臺灣政策白皮書】構面一:基礎環境
【網路智慧新臺灣政策白皮書】構面一:基礎環境

20150416【網路智慧新臺灣政策白皮書】 副院長與網路社群有約 https://www.youtube.com/watch?v=4jfozoySvpA

白色圆环
白色圆环白色圆环
白色圆环
9-dash, 10-dash, 11-dash lines?
九段、⼗段、⼗⼀段線?
China's New 10-dash line? 中國新⼗段線?
The Taiwan Advantage


台灣優勢
A Free Taiwan
⾃由台灣
Taiwan’s international engagement
網絡聯盟宣⾔(加入)、數據交換協議(加入)、印太經濟架構(未加入)

Recommended for you

8.如何从外围进入各大公司内网
8.如何从外围进入各大公司内网8.如何从外围进入各大公司内网
8.如何从外围进入各大公司内网

.

Open Data 商務模式探討與案例分享
Open Data 商務模式探討與案例分享Open Data 商務模式探討與案例分享
Open Data 商務模式探討與案例分享

http://www.systex.com.tw/systex2/home/banner/EDM_2013/2013_SSD/0327/0327_01a.html Keynote 2--10:10~10:30 講題:Open Data 商務模式探討與案例分享 開放資料的發展與二十年前的網際網路,有何類同?促進資料的開放流通,在文化、經濟、環境和社會效益面,如何爆發需求、創造和傳播知識,滿足消費者需求? 將資料轉化為有價資產,為什麼需要開放?位處訊息孤島的台灣產業,如何在全球浮現的 Open Data 價值鏈,翻轉地域劣勢,取得先機?資料更為巨量、即時的面貌,如何影響城市、企業、智庫、組織和個人的生命?更為開放的各國政府資料,是機會還是危機?

opendatabigdatataiwan
前海:IT業發展與機遇
前海:IT業發展與機遇前海:IT業發展與機遇
前海:IT業發展與機遇

《前海:IT業發展與機遇》-- 在梁繼昌議員主辦的論壇的分享(2013.4.27)。

前海 it
Policy recommendations
政策建議
What does it have to do with Civil
Society?


與公⺠社會有什麼關係?
How can civil society protect Taiwan’s Internet freedom?
公⺠社會如何協助保障台灣網絡⾃由
• 台灣網絡⾃由是否因⽽⾯對任何危機?

• ⾏政部⾨和成立專責機構責任的劃分?

• 新專責機構的任命和權⼒及其獨立性?

• 境外數據儲存及域外管轄的不確定性?

• 協助教育社群,引導關注

• 針對重要議題,組織群眾

• 提升國際對台灣網絡⾃由議題的了解
International participation
走向國際
• 政府應該推動數位轉型、產業化及⼈才發展,公⺠社會亦可爭取更⼤本⼟及國際空間...

• 利⽤數位公⺠社會及開放數據等領域的發展經驗,更多參與區域

公⺠社會合作及分享,加強國際視野及關注

• 加強參與國際及亞太區網絡管治(Internet governance)及

multi-stakeholder(多⽅利益相關者)組織及活動

• 爭取市⺠社會及技術社群透過政府參與制定關於未來網絡及數據

分享政策的討論

• 台灣的⾃由和⺠主是是台灣最成功和最⼤的優勢,也可以成為最

⼤的保障,公⺠社會的⾓⾊可以把台灣的故事說給全世界!

Recommended for you

OpenCongress.org 開放國會網站簡介
OpenCongress.org 開放國會網站簡介OpenCongress.org 開放國會網站簡介
OpenCongress.org 開放國會網站簡介
金融反欺诈中,社交网络算法有用吗?
金融反欺诈中,社交网络算法有用吗?金融反欺诈中,社交网络算法有用吗?
金融反欺诈中,社交网络算法有用吗?
大数据知识及技术简介(Introduction to basic concepts and techiques of big data in Chinese)
大数据知识及技术简介(Introduction to basic concepts and techiques of big data in Chinese)大数据知识及技术简介(Introduction to basic concepts and techiques of big data in Chinese)
大数据知识及技术简介(Introduction to basic concepts and techiques of big data in Chinese)

This powerpoint does a introduction to basic concepts and techiques of big data. It's target readers are normal people starts to be interested in "Big Data" and data analytics.

big databasic knowledgedata analytics


Charles Mok 莫乃光

@charlesmok 

charlespmok@gmail.com

More Related Content

What's hot

Tietoturva ja luotettava tieto
Tietoturva ja luotettava tietoTietoturva ja luotettava tieto
Tietoturva ja luotettava tieto
Harto Pönkä
 
LinkedInin käyttö rekrytoinnissa
LinkedInin käyttö rekrytoinnissaLinkedInin käyttö rekrytoinnissa
LinkedInin käyttö rekrytoinnissa
Harto Pönkä
 
Fake news
Fake newsFake news
Fake news
Library
 
Fake News and the Trouble with Facebook
Fake News and the Trouble with FacebookFake News and the Trouble with Facebook
Fake News and the Trouble with Facebook
Dan Kennedy
 
Parisuhde ja perhe ppt
Parisuhde ja perhe pptParisuhde ja perhe ppt
Parisuhde ja perhe ppt
Mikko Siitonen
 
Eleanor Roosevelt Courage Project
Eleanor Roosevelt Courage ProjectEleanor Roosevelt Courage Project
Eleanor Roosevelt Courage Project
wmsbierer
 
21 &55. Kiina kohtaa länsimaat & Kiinasta tulee mahtitekijä
21 &55. Kiina kohtaa länsimaat & Kiinasta tulee mahtitekijä21 &55. Kiina kohtaa länsimaat & Kiinasta tulee mahtitekijä
21 &55. Kiina kohtaa länsimaat & Kiinasta tulee mahtitekijä
slidesharexi
 
Tietosuoja oppilaitoksen hallinnossa
Tietosuoja oppilaitoksen hallinnossaTietosuoja oppilaitoksen hallinnossa
Tietosuoja oppilaitoksen hallinnossa
Harto Pönkä
 
Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...
IT Governance Ltd
 

What's hot (10)

Tietoturva ja luotettava tieto
Tietoturva ja luotettava tietoTietoturva ja luotettava tieto
Tietoturva ja luotettava tieto
 
LinkedInin käyttö rekrytoinnissa
LinkedInin käyttö rekrytoinnissaLinkedInin käyttö rekrytoinnissa
LinkedInin käyttö rekrytoinnissa
 
Fake news
Fake newsFake news
Fake news
 
Fake News and the Trouble with Facebook
Fake News and the Trouble with FacebookFake News and the Trouble with Facebook
Fake News and the Trouble with Facebook
 
Parisuhde ja perhe ppt
Parisuhde ja perhe pptParisuhde ja perhe ppt
Parisuhde ja perhe ppt
 
Eleanor Roosevelt Courage Project
Eleanor Roosevelt Courage ProjectEleanor Roosevelt Courage Project
Eleanor Roosevelt Courage Project
 
21 &55. Kiina kohtaa länsimaat & Kiinasta tulee mahtitekijä
21 &55. Kiina kohtaa länsimaat & Kiinasta tulee mahtitekijä21 &55. Kiina kohtaa länsimaat & Kiinasta tulee mahtitekijä
21 &55. Kiina kohtaa länsimaat & Kiinasta tulee mahtitekijä
 
Tietosuoja oppilaitoksen hallinnossa
Tietosuoja oppilaitoksen hallinnossaTietosuoja oppilaitoksen hallinnossa
Tietosuoja oppilaitoksen hallinnossa
 
Talvisota pp
Talvisota ppTalvisota pp
Talvisota pp
 
Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...
 

Similar to 全球數位威權趨勢對台灣的挑戰和機遇

1031031 twnic研討會與談-網路與個資保護
1031031 twnic研討會與談-網路與個資保護1031031 twnic研討會與談-網路與個資保護
1031031 twnic研討會與談-網路與個資保護
Taipei District Prosecutors' Office
 
【網路智慧新臺灣政策白皮書】構面一:基礎環境
【網路智慧新臺灣政策白皮書】構面一:基礎環境【網路智慧新臺灣政策白皮書】構面一:基礎環境
【網路智慧新臺灣政策白皮書】構面一:基礎環境
R.O.C.Executive Yuan
 
白色圆环
白色圆环白色圆环
白色圆环
oldtaotao
 
8.如何从外围进入各大公司内网
8.如何从外围进入各大公司内网8.如何从外围进入各大公司内网
8.如何从外围进入各大公司内网
Hsiao Tim
 
Open Data 商務模式探討與案例分享
Open Data 商務模式探討與案例分享Open Data 商務模式探討與案例分享
Open Data 商務模式探討與案例分享
TH Schee
 
前海:IT業發展與機遇
前海:IT業發展與機遇前海:IT業發展與機遇
前海:IT業發展與機遇
Charles Mok
 
OpenCongress.org 開放國會網站��介
OpenCongress.org 開放國會網站簡介OpenCongress.org 開放國會網站簡介
OpenCongress.org 開放國會網站簡介
OpenCongress Taiwan
 
金融反欺诈中,社交网络算法有用吗?
金融反欺诈中,社交网络算法有用吗?金融反欺诈中,社交网络算法有用吗?
金融反欺诈中,社交网络算法有用吗?
Ting WANG
 
大数据知识及技术简介(Introduction to basic concepts and techiques of big data in Chinese)
大数据知识及技术简介(Introduction to basic concepts and techiques of big data in Chinese)大数据知识及技术简介(Introduction to basic concepts and techiques of big data in Chinese)
大数据知识及技术简介(Introduction to basic concepts and techiques of big data in Chinese)
Ye (Julia) Li
 
[CBLP] 個資法雙連發-怪怪的個資法-ox-20130225
[CBLP] 個資法雙連發-怪怪的個資法-ox-20130225[CBLP] 個資法雙連發-怪怪的個資法-ox-20130225
[CBLP] 個資法雙連發-怪怪的個資法-ox-20130225
Yi-Feng Tzeng
 
資訊人之人文素養~黃聰亮教授演講投影片
資訊人之人文素養~黃聰亮教授演講投影片資訊人之人文素養~黃聰亮教授演講投影片
資訊人之人文素養~黃聰亮教授演講投影片
vincent8899
 
網路新時代的政府優質化 (1)
網路新時代的政府優質化 (1)網路新時代的政府優質化 (1)
網路新時代的政府優質化 (1)
Shin-Cheng Yeh
 
Trs互联网舆情管理系统白皮书
Trs互联网舆情管理系统白皮书Trs互联网舆情管理系统白皮书
Trs互联网舆情管理系统白皮书
cigarxj
 
互聯網的挑戰與機遇
互聯網的挑戰與機遇互聯網的挑戰與機遇
互聯網的挑戰與機遇
Charles Mok
 
Big Data and Future
Big Data and FutureBig Data and Future
Big Data and Future
Qifang (James) Zhao
 
Big Data Tornado - 2015 台灣 Big Data 企業經典應用案例分享
Big Data Tornado - 2015 台灣 Big Data 企業經典應用案例分享Big Data Tornado - 2015 台灣 Big Data 企業經典應用案例分享
Big Data Tornado - 2015 台灣 Big Data 企業經典應用案例分享
Etu Solution
 
2013調查報導工作坊 - 資料搜尋與處理
2013調查報導工作坊 - 資料搜尋與處理2013調查報導工作坊 - 資料搜尋與處理
2013調查報導工作坊 - 資料搜尋與處理
whisky CHANG
 
11817個人報告
11817個人報告11817個人報告
11817個人報告
Allen Lee
 

Similar to 全球數位威權趨勢對台灣的挑戰和機遇 (20)

1031031 twnic研討會與談-網路與個資保護
1031031 twnic研討會與談-網路與個資保護1031031 twnic研討會與談-網路與個資保護
1031031 twnic研討會與談-網路與個資保護
 
What is big data
What is big dataWhat is big data
What is big data
 
Open data
Open dataOpen data
Open data
 
【網路智慧新臺灣政策白皮書】構面一:基礎環境
【網路智慧新臺灣政策白皮書】構面一:基礎環境【網路智慧新臺灣政策白皮書】構面一:基礎環境
【網路智慧新臺灣政策白皮書】構面一:基礎環境
 
白色圆环
白色圆环白色圆环
白色圆环
 
8.如何从外围进入各大公司内网
8.如何从外围进入各大公司内网8.如何从外围进入各大公司内网
8.如何从外围进入各大公司内网
 
Open Data 商務模式探討與案例分享
Open Data 商務模式探討與案例分享Open Data 商務模式探討與案例分享
Open Data 商務模式探討與案例分享
 
前海:IT業發展與機遇
前海:IT業發展與機遇前海:IT業發展與機遇
前海:IT業發展與機遇
 
OpenCongress.org 開放國會網站簡介
OpenCongress.org 開放國會網站簡介OpenCongress.org 開放國會網站簡介
OpenCongress.org 開放國會網站簡介
 
金融反欺诈中,社交网络算法有用吗?
金融反欺诈中,社交网络算法有用吗?金融反欺诈中,社交网络算法有用吗?
金融反欺诈中,社交网络算法有用吗?
 
大数据知识及技术简介(Introduction to basic concepts and techiques of big data in Chinese)
大数据知识及技术简介(Introduction to basic concepts and techiques of big data in Chinese)大数据知识及技术简介(Introduction to basic concepts and techiques of big data in Chinese)
大数据知识及技术简介(Introduction to basic concepts and techiques of big data in Chinese)
 
[CBLP] 個資法雙連發-怪怪的個資法-ox-20130225
[CBLP] 個資法雙連發-怪怪的個資法-ox-20130225[CBLP] 個資法雙連發-怪怪的個資法-ox-20130225
[CBLP] 個資法雙連發-怪怪的個資法-ox-20130225
 
資訊人之人文素養~黃聰亮教授演講投影片
資訊人之人文素養~黃聰亮教授演講投影片資訊人之人文素養~黃聰亮教授演講投影片
資訊人之人文素養~黃聰亮教授演講投影片
 
網路新時代的政府優質化 (1)
網路新時代的政府優質化 (1)網路新時代的政府優質化 (1)
網路新時代的政府優質化 (1)
 
Trs互联网舆情管理系统白皮书
Trs互联网舆情管理系统白皮书Trs互联网舆情管理系统白皮书
Trs互联网舆情管理系统白皮书
 
互聯網的挑戰與機遇
互聯網的挑戰與機遇互聯網的挑戰與機遇
互聯網的挑戰與機遇
 
Big Data and Future
Big Data and FutureBig Data and Future
Big Data and Future
 
Big Data Tornado - 2015 台灣 Big Data 企業經典應用案例分享
Big Data Tornado - 2015 台灣 Big Data 企業經典應用案例分享Big Data Tornado - 2015 台灣 Big Data 企業經典應用案例分享
Big Data Tornado - 2015 台灣 Big Data 企業經典應用案例分享
 
2013調查報導工作坊 - 資料搜尋與處理
2013調查報導工作坊 - 資料搜尋與處理2013調查報導工作坊 - 資料搜尋與處理
2013調查報導工作坊 - 資料搜尋與處理
 
11817個人報告
11817個人報告11817個人報告
11817個人報告
 

More from Charles Mok

Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
Charles Mok
 
Threats to the Internet
Threats to the Internet Threats to the Internet
Threats to the Internet
Charles Mok
 
Cyber Risks in Hong Kong
Cyber Risks in Hong KongCyber Risks in Hong Kong
Cyber Risks in Hong Kong
Charles Mok
 
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through CompulsionICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
Charles Mok
 
全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇
Charles Mok
 
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology FragmentationDigital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Charles Mok
 
HKU Tech for Good year2.pdf
HKU Tech for Good year2.pdfHKU Tech for Good year2.pdf
HKU Tech for Good year2.pdf
Charles Mok
 
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for DemocracyTechnology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
Charles Mok
 
APAC Data Center Infrastructure Observations
APAC Data Center Infrastructure ObservationsAPAC Data Center Infrastructure Observations
APAC Data Center Infrastructure Observations
Charles Mok
 
Chinese Digital Repression
Chinese Digital RepressionChinese Digital Repression
Chinese Digital Repression
Charles Mok
 
Technology, Data and Ethics
Technology, Data and EthicsTechnology, Data and Ethics
Technology, Data and Ethics
Charles Mok
 
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
Charles Mok
 
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdfCensorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
Charles Mok
 
HKU Tech for Good.pdf
HKU Tech for Good.pdfHKU Tech for Good.pdf
HKU Tech for Good.pdf
Charles Mok
 
Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...
Charles Mok
 
Misinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldMisinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the World
Charles Mok
 
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and TrendsFrom Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
Charles Mok
 
From Crypto to Trust and Identity
From Crypto to Trust and IdentityFrom Crypto to Trust and Identity
From Crypto to Trust and Identity
Charles Mok
 
Have you AI'ed today? A Reality Check
Have you AI'ed today? A Reality CheckHave you AI'ed today? A Reality Check
Have you AI'ed today? A Reality Check
Charles Mok
 
The Trouble with "Fake News" Laws
The Trouble with "Fake News" LawsThe Trouble with "Fake News" Laws
The Trouble with "Fake News" Laws
Charles Mok
 

More from Charles Mok (20)

Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
 
Threats to the Internet
Threats to the Internet Threats to the Internet
Threats to the Internet
 
Cyber Risks in Hong Kong
Cyber Risks in Hong KongCyber Risks in Hong Kong
Cyber Risks in Hong Kong
 
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through CompulsionICANN TWNIC TWIGF 2023: Compliance through Compulsion
ICANN TWNIC TWIGF 2023: Compliance through Compulsion
 
全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇
 
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology FragmentationDigital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
 
HKU Tech for Good year2.pdf
HKU Tech for Good year2.pdfHKU Tech for Good year2.pdf
HKU Tech for Good year2.pdf
 
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for DemocracyTechnology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
 
APAC Data Center Infrastructure Observations
APAC Data Center Infrastructure ObservationsAPAC Data Center Infrastructure Observations
APAC Data Center Infrastructure Observations
 
Chinese Digital Repression
Chinese Digital RepressionChinese Digital Repression
Chinese Digital Repression
 
Technology, Data and Ethics
Technology, Data and EthicsTechnology, Data and Ethics
Technology, Data and Ethics
 
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
 
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdfCensorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
 
HKU Tech for Good.pdf
HKU Tech for Good.pdfHKU Tech for Good.pdf
HKU Tech for Good.pdf
 
Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...
 
Misinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldMisinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the World
 
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and TrendsFrom Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
 
From Crypto to Trust and Identity
From Crypto to Trust and IdentityFrom Crypto to Trust and Identity
From Crypto to Trust and Identity
 
Have you AI'ed today? A Reality Check
Have you AI'ed today? A Reality CheckHave you AI'ed today? A Reality Check
Have you AI'ed today? A Reality Check
 
The Trouble with "Fake News" Laws
The Trouble with "Fake News" LawsThe Trouble with "Fake News" Laws
The Trouble with "Fake News" Laws
 

全球數位威權趨勢對台灣的挑戰和機遇