background preloader

Cybersphere and Big Data / Cybersphère et Big Data

Facebook Twitter

WPC 2015: Mari Kiviniemi on the global challenges of the digital technologies.

WPC 2013 - Lunch debate 1

WPC 2014 - Ben Scott - Subject: Big Data. WPC 2013 - Carl Bildt - Subject: Digital economy and cyberwarfare. Camille Belsoeur : La bataille qui secoue le ciel africain pour le contrôle d'Internet. Le taux de pénétration d'Internet en Afrique est toujours le plus faible au monde.

Camille Belsoeur : La bataille qui secoue le ciel africain pour le contrôle d'Internet

Seulement 16% de la population du continent a accès au réseau mondial en 2014, selon les chiffres de l'Union internationales des télécommunications (UIT). Des câbles sous-marin reliés à l'Internet mondial raccordent l'Afrique au reste du monde, mais ensuite tout le problème réside dans ce que les experts appellent "le dernier kilomètre". Autrement dit, les câbles qui doivent amener le haut-débit dans les foyers africains. H.S.H. Prince Michael of Liechtenstein: Cyber security and hacking. There is a general complaining game going on of being hacked and spied upon.

H.S.H. Prince Michael of Liechtenstein: Cyber security and hacking

Virtually all governments have institutions that eavesdrop on, and break into other nations’ security systems. They engage in economic espionage, monitor their own population and even commit cyber-attacks. Modern technology makes this possible and creates vulnerabilities, writes Prince Michael of Liechtenstein. The other side of the coin is that just about every state indignantly considers itself a victim of spying and hacking by others. Whilst considering their own actions legitimate, they see such actions by others as criminal, especially if attacks come from independent bodies. It is a very well-known fact that any information, connected to the web, can be hacked. It is therefore surprising how irresponsibly modern communication and data storage are used.

It is a widely known fact that illegal intrusion into data is now almost common. Marc Hecker : "La manière dont l'EI utilise les réseaux sociaux est réellement innovante" Joseph Nye: International Norms in Cyberspace. CAMBRIDGE – Last month, the Netherlands hosted the Global Conference on Cyberspace 2015, which brought together nearly 2,000 government officials, academics, industry representatives, and others.

Joseph Nye: International Norms in Cyberspace

I chaired a panel on cyber peace and security that included a Microsoft vice president and two foreign ministers. This “multi-stakeholder” conference was the latest in a series of efforts to establish rules of the road to avoid cyber conflict. The capacity to use the Internet to inflict damage is now well established. Many observers believe the American and Israeli governments were behind an earlier attack that destroyed centrifuges at an Iranian nuclear facility.

Some say an Iranian government attack destroyed thousands of Saudi Aramco computers. Until recently, cyber security was largely the domain of a small community of computer experts. Then, in the early 1990s, the World Wide Web emerged, growing from a few million users then to more than three billion today. Derek H. Burney & Fen Osler Hampson: Data collection should be based on principles of necessity. Derek H.

Derek H. Burney & Fen Osler Hampson: Data collection should be based on principles of necessity

Burney was Canada’s ambassador to the U.S. from 1989-1993. He was directly involved in negotiating the Free Trade Agreement with the U.S.; Fen Osler Hampson is a distinguished fellow and director of Global Security at the Centre for International Governance Innovation. He is also co-director of the Global Commission on Internet Governance. They are the authors of Brave New Canada: Meeting the Challenge of a Changing World. The revelation that Germany’s own foreign intelligence service (BND) has been spying at the behest of the U.S. Ironically, perhaps, just at the spy scandal was grabbing headlines in Germany, a U.S. appeals court in New York was clipping the NSA’s wings by ruling that the agency’s widespread collection of telephone records was illegal. In this new digital era, governments must recognize that they too have a responsibility to respect the privacy of their citizens online and uphold the rule of law. Sophie Fay : Quelle gouvernance pour Internet ? Le grand écart des diplomates.

Michel Touma : La WPC participe au débat : le Big Data débouchera-t-il sur un Big Brother ? #COP21 : comment les big data contribuent à la lutte contre le changement climatique. Evénement diplomatique de l’année en France, la 21e conférence des Nations Unies sur les changements climatiques (COP21) réunit à Paris jusqu’au 11 décembre les représentants de 196 « parties » pour trouver un accord global sur la réduction des émissions des gaz à effet de serre dues aux activités humaines.

#COP21 : comment les big data contribuent à la lutte contre le changement climatique

Au-delà de négociations entre chefs d’État, le combat mondial pour limiter l’augmentation des températures moyennes passe par les citoyens et les entreprises. Les nouvelles technologies permettent de nombreuses innovations en ce sens. Focus sur la contribution des big data face au dérèglement climatique. Données, algorithmes, intelligence artificielle : ces concepts, présents partout dans nos vies ou en passe de l’être, pourraient jouer un grand rôle dans la préservation de notre environnement, comme le montre cette sélection d’exemples. Économiser l’énergie avec l’Internet des objets Source.

Fourth Industrial Revolution/Quatrième révolution industrielle

Google - right to be forgotten / Google - droit à l'oubli. IoT, Big Data, Cloud, Mobile. Cyber-attaques / Cyber-attacks.