This presentation reported on results from the examination of interference using disinformation through digital platforms. Its methods relied on media monitoring (both traditional media and social media) and interviews with party strategists. The aim was to detail the main instances of disinformation and other digital threats, and to analyze how each of the major parties …
Les jouets connectés à Internet (IoToys) offrent aux enfants des possibilités de jeu, d’apprentissage et de soutien éducatif grâce à leurs fonctionnalités interactives et personnalisées. Les IoToys, comme tout autre appareil Internet des objets (IoT), contiennent des éléments électroniques et informatiques intégrés, tels que des microphones, des caméras, des capteurs de différents types, qui leur …
Internet-connected toys (IoToys) offer children opportunities to play and learn, and also educational support thanks to their interactive and personalized features. IoToys, like any other Internet of Things (IoT) devices, contain embedded electronics and computing elements, such as microphones, cameras, sensors of various kinds, which enable them to interact with users and adapt to their …
About the speaker Dr. Helen Tang is a senior Defence Scientist and Portfolio Manager with Innovation for Defence Excellence and Security (IDEaS), Defence R&D Canada Ottawa. She received her Ph.D. in Electrical Engineering from Carleton University in 2005. From 1999 to 2005, she worked in several R&D organizations in Canada and the USA including Alcatel-Lucent, …
De nos jours, la cybersécurité est aussi essentielle qu’omniprésente. Les utilisateurs finaux doivent être prêts et disposés à participer à la protection de leurs informations. Afin de s’assurer que les utilisateurs se conforment à la protection de leurs données, il est essentiel que les dispositifs mis en place soit faciles d’utilisation et de garder, par …
Nowadays, cybersecurity is as essential as it is ubiquitous. End-users have to be willing and able participants in the protection of their information. In order to ensure user compliance with data protection, the mechanisms put in place must be easy to use and, thus, it is essential to keep the user in mind when conceiving …
Compelling evidence of foreign cyber-interference in the 2016 US Presidential election campaign has prompted a robust policy response in Canada at the federal level. This presentation will review legislative changes, the critical incident contingency plan, and initiatives to promote voters’ resiliency, and offer an early evaluation of their implementation in the 2019 campaign. About the …
Selon un rapport du Commissariat à la protection de la vie privée du Canada, en 2018, 92 % des Canadiens ont exprimé des préoccupations quant à la protection de leur vie privée. Toutefois, certaines personnes ont un comportement qui met leurs données en danger. Cette disparité entre préoccupation alléguée et action pratique est connue sous le …
According to a report from the Office of the Privacy Commissioner of Canada, in 2018, 92% of Canadians expressed some levels of concern regarding the protection of their privacy. However, some individuals frequently exhibit behaviour which places their data at risk. This disparity between claimed concern and practical action is called the Privacy Paradox. The …
About the speaker Laura Stephenson is a Professor of political science at the University of Western Ontario. She co-directs the Consortium on Electoral Democracy (C-Dem). She specializes in the study of political behaviour, both Canadian and comparative. Her research is focused on understanding how institutions and context influence attitudes, electoral preferences and engagement with politics. …