Programme overview 2016: Difference between revisions
Jump to navigation
Jump to search
(3 intermediate revisions by the same user not shown) | |||
Line 354: | Line 354: | ||
| style="border: 1px solid #00000a; padding: 0in 0.08in;" colspan="2" bgcolor="#FFFACD" width="542"| | | style="border: 1px solid #00000a; padding: 0in 0.08in;" colspan="2" bgcolor="#FFFACD" width="542"| | ||
'''[[From_cybersecurity_to_terrorism_–_are_we_all_under_surveillance%3F_–_PL_03a_2016 | PL 3a: From cybersecurity to terrorism | '''[[From_cybersecurity_to_terrorism_–_are_we_all_under_surveillance%3F_–_PL_03a_2016 | PL 3a: From cybersecurity to terrorism – are we all under surveillance?]]''' | ||
'''Gold Hall''' | '''Gold Hall''' | ||
Line 380: | Line 380: | ||
| style="border: 1px solid #00000a; padding: 0in 0.08in;" width="74"| | | style="border: 1px solid #00000a; padding: 0in 0.08in;" width="74"| | ||
12:15 '''[[World_Economic_Forum_–_Future_of_the_digital_economy_and_society_–_Flash_9_2016 | F9: World Economic | 12:15 '''[[World_Economic_Forum_–_Future_of_the_digital_economy_and_society_–_Flash_9_2016 | F9: World Economic Forum – Future of the digital economy and society ]]''' | ||
'''Room 206''' | '''Room 206''' | ||
Line 420: | Line 420: | ||
| style="border: 1px solid #00000a; padding: 0in 0.08in;" colspan="2" bgcolor="#FFFACD" width="542"| | | style="border: 1px solid #00000a; padding: 0in 0.08in;" colspan="2" bgcolor="#FFFACD" width="542"| | ||
'''[[PL 3b: Intermediaries and human rights - between co-opted law enforcement and human rights protection]]''' | '''[[Intermediaries_and_human_rights_–_between_co-opted_law_enforcement_and_human_rights_protection_–_PL_03b_2016 | PL 3b: Intermediaries and human rights - between co-opted law enforcement and human rights protection]]''' | ||
'''Gold Hall''' | '''Gold Hall''' | ||
Line 431: | Line 431: | ||
| style="border: 1px solid #00000a; padding: 0in 0.08in;" width="74"| | | style="border: 1px solid #00000a; padding: 0in 0.08in;" width="74"| | ||
14:30 '''[[F10: Live demo: the Global Internet Policy Observatory]]''' | 14:30 '''[[Live_demo:_the_Global_Internet_Policy_Observatory_–_Flash_10_2016 | F10: Live demo: the Global Internet Policy Observatory]]''' | ||
'''Room 206''' | '''Room 206''' | ||
Line 442: | Line 442: | ||
|- | |- | ||
| style="border: 1px solid #00000a; padding: 0in 0.08in;" colspan="2" bgcolor="#FFB6C1" width="542"| | | style="border: 1px solid #00000a; padding: 0in 0.08in;" colspan="2" bgcolor="#FFB6C1" width="542"| | ||
'''[[WS 5 follow up: The future of cybersecurity in Europe | '''[[The_future_of_cybersecurity_in_Europe_–_from_state_of_play_to_state_of_art_–_WS_05_follow_up_2016 | WS 5 follow up: The future of cybersecurity in Europe – from state of play to state of art.]]''' | ||
'''Room 201 A/B''' | '''Room 201 A/B''' | ||
Line 449: | Line 449: | ||
| style="border: 1px solid #00000a; padding: 0in 0.08in;" width="74"| | | style="border: 1px solid #00000a; padding: 0in 0.08in;" width="74"| | ||
15:15 '''[[F11: Open government and its interconnections with Internet governance]]''' | 15:15 '''[[Open_government_and_its_interconnections_with_Internet_governance_–_Flash_11_2016 | F11: Open government and its interconnections with Internet governance]]''' | ||
'''Room 206''' | '''Room 206''' | ||
|- | |- | ||
| style="border: 1px solid #00000a; padding: 0in 0.08in;" colspan="2" bgcolor="#87CEFA" width="542"| | | style="border: 1px solid #00000a; padding: 0in 0.08in;" colspan="2" bgcolor="#87CEFA" width="542"| | ||
'''[[WS 7 follow up: Impact of zero rating ]]''' | '''[[Impact_of_zero_rating_–_WS_07_follow_up_2016 | WS 7 follow up: Impact of zero rating ]]''' | ||
<div style='margin-bottom: 0in;'>'''Room 213/215'''</div> | <div style='margin-bottom: 0in;'>'''Room 213/215'''</div> | ||
[https://youtu.be/QHHr8lb48hE See video record] | [https://youtu.be/QHHr8lb48hE See video record] | ||
Line 463: | Line 463: | ||
| style="border: 1px solid #00000a; padding: 0in 0.08in;" colspan="2" bgcolor="#87CEFA" width="542"| | | style="border: 1px solid #00000a; padding: 0in 0.08in;" colspan="2" bgcolor="#87CEFA" width="542"| | ||
<div style='margin-bottom: 0in;'></div> | <div style='margin-bottom: 0in;'></div> | ||
'''[[WS 9: Signed, sealed | '''[[Signed,_sealed_–_deciphered%3F_Holding_algorithms_accountable_to_protect_fundamental_rights_–_WS_09_2016 | WS 9: Signed, sealed – deciphered? Holding algorithms accountable to protect fundamental rights]]''' | ||
'''Room 211/212''' | '''Room 211/212''' | ||
Line 472: | Line 472: | ||
|- | |- | ||
| style="border: 1px solid #00000a; padding: 0in 0.08in;" colspan="2" bgcolor="#F0FFF0" width="542"| | | style="border: 1px solid #00000a; padding: 0in 0.08in;" colspan="2" bgcolor="#F0FFF0" width="542"| | ||
'''[[WS 10: Confronting the digital divide (2) | '''[[Confronting_the_digital_divide_(2)_–_Refugees,_human_rights_and_Internet_access_–_WS_10_2016 | WS 10: Confronting the digital divide (2) – Refugees, human rights and Internet access]]''' | ||
<div style='margin-bottom: 0in;'>'''Room 214/216'''</div>[https://youtu.be/j7ysl5O_K3Q See video record] | <div style='margin-bottom: 0in;'>'''Room 214/216'''</div>[https://youtu.be/j7ysl5O_K3Q See video record] | ||
Line 489: | Line 489: | ||
| style="border: 1px solid #00000a; padding: 0in 0.08in;" colspan="2" bgcolor="#fff0f5" width="542"| | | style="border: 1px solid #00000a; padding: 0in 0.08in;" colspan="2" bgcolor="#fff0f5" width="542"| | ||
'''[[PL 4: Internet fragmentation and digital sovereignty: implications for Europe]]''' | '''[[Internet_fragmentation_and_digital_sovereignty:_implications_for_Europe_–_PL_04_2016 | PL 4: Internet fragmentation and digital sovereignty: implications for Europe]]''' | ||
<div style='margin-bottom: 0in;'>'''Gold Hall'''</div> | <div style='margin-bottom: 0in;'>'''Gold Hall'''</div> | ||
[https://youtu.be/j8rcSKN0CD4 See video record] | [https://youtu.be/j8rcSKN0CD4 See video record] | ||
Line 497: | Line 497: | ||
| style="border: 1px solid #00000a; padding: 0in 0.08in;" width="74"| | | style="border: 1px solid #00000a; padding: 0in 0.08in;" width="74"| | ||
16:30 '''[[F12: Next generation cybersecurity regulations and an outdated export control regime]]''' | 16:30 '''[[Next_generation_cybersecurity_regulations_and_an_outdated_export_control_regime_–_Flash_12_2016 | F12: Next generation cybersecurity regulations and an outdated export control regime]]''' | ||
'''Room 206''' | '''Room 206''' | ||
Line 517: | Line 517: | ||
[https://youtu.be/IRPAqniNNsQ?list=PLit-Hh_9fzQ6-DZOlraRuIwNM7kyFW-Mi See video record] | [https://youtu.be/IRPAqniNNsQ?list=PLit-Hh_9fzQ6-DZOlraRuIwNM7kyFW-Mi See video record] | ||
|} | |} | ||
[[Category:Programme overview]] | |||
[[Category:2016]][[Category:Programme overview]] |
Latest revision as of 17:50, 27 November 2020
EuroDIG programme 2016 with links to all session pages and video records
Pre events. Wednesday 8. June 2016
Time |
Pre-Events | |||
09:30 - 12:30 |
Roundtable on the contribution of GIPO to multistakeholderism in Internet governance | |||
14:00 - 18:00
|
Dynamic Coalition: Internet of Things Room 201 A/B |
Co-designing the Global Internet Policy Observatory (GIPO) 2016 Room 211/212 |
14:30-18:00 Knowing. The future of the Internet and how to reboot it Room 213/215 | |
18:30 - 20:30 |
Welcoming cocktail sponsored by Google with Alexander De Croo, Deputy Prime Minister of Belgium
|