Policy Research

ICT4Peace Blogpost: When going viral can be lethal: The need for reliable information in the wake of Covid-19

By Anne-Marie Buzatu, Senior Advisor ICT4Peace

When going viral can be lethal: The need for reliable information in the wake of Covid-19 By Anne-Marie Buzatu[1] In these uncertain Covid-19 times, most of us have been scrambling to  ...

, , , , , , , , ,

CORONA PAN(DEM)IC: THE GATEWAY TO GLOBAL SURVEILLANCE?

Our solidarity must be grounded on facts – not on fear.

CORONA PAN(DEM)IC: THE GATEWAY TO GLOBAL SURVEILLANCE? Our solidarity must be grounded on facts – not on fear.   As a follow-up to the key note speech by  Regina Surber  ...

, , , , , , , ,

Regina Surber on Corona, Technology and Human Rights

An audio recording of her presentation.

Regina Surber, Senior Advisor at ICT4Peace and the Zurich Hub for Ethics and Technology (ZHET) delivered the keynote speech at the  #SwissCognitive and @AICapitalCO virtual conference entitled “Corona, Technology and Human Rights”. Regina provided  ...

, , , , , , , , ,

UN OEWG ICT4Peace Comments on UN Cybersecurity Negotiation Draft Paper

ICT4Peace has been supporting the UN Cybersecurity Negotiations at the Open Ended Working Group (OEWG) with substantive inputs since the launch of the negotiations in the fall of 2019 (more  ...

, , , , , , , ,

First Twitter research partnership in New Zealand on countering polarisation, hate and violence

ICT4Peace is very pleased to announce that Sanjana Hattotuwa, Special Advisor ICT4Peace Foundation and PhD candidate at Otago University’s National Centre for Peace & Conflict Studies (NCPACS) has co-launched and will lead  ...

, , , , , , ,

UN OEWG UN GGE – ICT4Peace proposed a State “Cyber Peer Review Mechanism” for state-conducted foreign cyber operations to UN Cybersecurity Negotiations

A proposal by the ICT4Peace Foundation to be considered by the UN Negotiations under UN OEWG and the UN GGE

In view of the ongoing UN Negotiations (UN OEWG and UN GGE) ICT4Peace Proposed [1] a State “Cyber Peer Review Mechanism” for state-conducted foreign cyber operations. It has been generally acknowledged that some  ...

, , , , , , , ,