|
A number of eminent researchers, academics, industrialists and policy makers in the field of risks and challenges of the
network society are already in the pipeline to address the summer school and give workshops. The focus of the school will be on dynamic,
interactive learning among peers, and the exchange of the state-of-the-art information and views. Each day will consist of keynote talks by
two individuals and a series of multi-participant workshops and seminars.
To give you a flavour of the summer school experience, feedback from the first summer school in Brighton, UK included: 'It was the best
organised, most inspiring meeting I've attended - and excellent fun to boot'; 'It was very well balanced; 'It works!'; 'It was the best event
that I have ever been to and I met some immensely stimulating people'; and 'It was like doing another masters degree all over again, but
intensely, in a single week.
Draft Programme: "Risks and Challenges of the Network Society"
Sunday, August 3, 2003:
19.00 - 21.00: | Social Event: Welcome Reception at Carlstad Confernence Center |
Monday, August 4, 2003:
08.15 - 09.00: | Registration |
09.00 - 09.30: | Opening session, Welcome by Christina Ullenius (Rector of Karlstad University) |
09.30 - 10.30: | Keynote talk 1: Jacques Berleur (Namur University, Belgium): "Ethics and the regulations of the
Internet" |
10.30 - 11.00: | Coffee Break |
11.00 - 12.00: | Keynote talk 2: Gunilla Bradley (Royal Institute of Technology, Sweden): "HUMANS ON THE NET -
Risks and Opportunities in the Net Era" |
12.00 - 13.30 | Lunch |
13.30 - 16.30: | (coffee break at 14.30)
Workshop 1 on "Ethics of Computing" (Chair: Jan Holvast)
and
Workshop 2 on "Challenges for the Network Society" (Chair: Leif Bloch Rasmussen) |
Tuesday, August 5, 2003:
09.00 - 10.30: | Keynote talk 3:
Richard S. Rosenberg (University of British Columbia, Canada), "Security Versus Civil Liberties: The Preservation of Online Free Speech and
Privacy in an Age of Global Terrorism" |
| Keynote talk 4:
Julie Cameron (Info.T.EC Solutions Pty Ltd, Australia), David Vaile (Faculty of Law, University of NSW, Australia), "The War on Terrorism
versus Cyber Liberties" |
10.30 - 11.00: | Coffee Break |
11.00 - 12.00: | Keynote talk 5:
Corinna Schulze (IT lawyer, Brussels), "EU Perspectives on Electronic Commerce & European Legal Framework" |
12.00 - 13.30: | Lunch |
13.30 - 16.00: | (coffee break at 14.30)
Workshop 4 on "Ambient Intelligence- Challenges and Risks" (Chair: Penny Duquenoy)
and
Workshop 5 on "Digital Divide (Part 1)" (Chairs: Susanne Sunden,
Gudrun Wicander) |
18.30: | Social Event: Boat trip |
Wednesday, August 6, 2003:
09.00 - 10.00: | Keynote talk 6:
Helena Lindskog (Privacy Manager, Ericsson, Sweden): Draft Title: "Privacy and PET in the Mobile Information Society" |
10.00 - 10.30: | Coffee Break |
10.30 - 11.30: | Keynote talk 7: Olle Findahl (World Internet Insitute), Digital Divide |
11.30 - 13.00: | Lunch |
13.00 - 16.30: | (coffee break at 14.30)
Workshop 5 on "Digital Divide (Part 2)" (Chairs: Susanne Sunden,
Gudrun Wicander)
and
Workshop 6 on "Privacy and PET" (Chair: Jan Holvast) |
Thursday, August 7, 2003:
09.00 - 10.00: | Keynote talk 8:
Louise Yngström (Stockholm University and Royal Institute of Technology, Sweden),
"Security & Control of IT in Society: positions for privacy" |
10.00 - 10.30: | Coffee Break |
10.30 - 11.30: | Keynote talk 9:
John Sören Petterson (Karlstad University, Sweden), Draft title:
"Human Values of IT" |
11.30 - 13.00: | Lunch |
13.00 - 16.00: | (coffee break at 14.30)
Workshop 7 on "IT and Health Care (Part I)" (Chair: Diane Whitehouse)
and
Workshop 8 on "Security and Risk Analysis (Part I)" (Chair: Albin Zuccato) |
17.00: | Social Event: Barbeque |
Friday, August 8, 2003:
09.30 - 12.30: | (coffee break at 10.45)
Workshop 7 on "IT and Health Care (Part II)" (Chair: Diane Whitehouse)
and
Workshop 8 on "Security and Risk Analysis (Part II)" (Chair: Albin Zuccato) |
12.30 - 14.00: | Lunch |
14.00 - 15.00: |
Concluding remarks on Social Aspects of IT and concluding discussion
(Jan Holvast) |
List of accepted workshop submissions:
Workshop 1: Ethics of Computing |
Penny Duquenoy Middlesex University, UK | Models for Internet Ethics |
Kai K. Kimppa, University of Turku, Finland | Redistribution of power
from government to intellectual property rights owners and organizations looking after their interests: Justifiable from a liberalist
position? |
Evangelos Moustakas Middlesex University, UK | The Responsibility of
Internet Service Providers for Unsolicited Commercial Communication (SPAM) |
Workshop 2: Challenges for the Network Society |
Rocío Rueda Ortiz Universidad Central of Colombia |
Deconstruction theory applied to the Network Society |
Leif Bloch Rasmussen Copenhagen Business School |
Exformation and Preformation in the Age of Information
- Designing Inquiring Organizations | Ella Smith, Ann Macintosh and Dr. Angus Whyte, International Teledemocracy Centre, Napier University,
UK | Culture and context in an online voting system for young people |
Martin Stenberg M. Stenberg Consulting Ky, Finland | KNOWING
ORGANIZATION - Skills and knowledge needed in the future |
Workshop 3: Critical Infrastructure Protection (cancelled) |
Workshop 4: Ambient Intelligence - Challenges and Risks |
Penny Duquenoy Middlesex University, UK | Ambient
Intelligence-Challenges and Risks |
Workshop 5: Digital Divide: |
Gudrun Wicander & Susanne Sundén Institutionen för Informationsteknologi, Karlstads Universitet,
Sweden | The BOP-people in the global IT-village- 10 critical success factors |
Robert Pinter Information Society Research Institute in Budapest | The relation of the old and new media -
television convergence and the digital divide |
A.Prabaharan Jawaharlal Nehru University, India | Digital Divide: The
Indian Scenario |
Respickius Casmir and Louise Yngström Stockholm University/Royal Institute of Technology, Sweden. |
Information Security Education for Developing Countries: The Challenges |
Tanguy Ewbank de Wespin, Jacques Berleur, University of Namur, Belgium | Social exclusion and ICT |
Workshop 6: Privacy and PET: |
Johan Hjelm, Ericsson Research, Sweden | Privacy in mobile games - a case
study |
Reine Lundin, Christer Andersson Karlstad University, Department of Computer Science, Sweden | MCROWDS:Anonymity in the Mobile Internet |
Marc van Lieshout | Privacy Enhancing Technologies - Just a promising Technology |
John Sören Petterson, Simone Fischer-Huebner |
PET and usability |
Workshop 7: IT and Health Care: |
A Anna Abramczyk (Medical Academy of Wroclaw), Antoni Izworski (Wroclaw University of Technology) and
Jozef B. Lewoc (BPBiT Leader), Poland | Case Study: Risks & Challenges for Training Nurses in Diabetes
Problems |
John Sören Petterson, Karlstad Univeristy, (possible additional contribution) | Medical Robotics and Human Aspects |
Workshop 8: Security and Risk Analysis: |
Vijay Masurkar Sun Services, Sun Microsystems, Inc., USA |
Designing
Network Security & Privacy for Exchange of Critical Information in an Enterprise Architecture |
Albin Zuccato Karlstad University, Department of Computer Science, Sweden | Introducing privacy risks in a companies information system security risk analysis |
Hanno Langweg Universität Bonn, Germany | If you stress it too hard it
breaks |
Andreas Jacobsson, Bengt Carlsson Blekinge Institute of Technology, Sweden | Privacy and Spam: Empirical Studies of Unsolicited
Commercial e-Mails |
Arslan Brömme Otto-von-Guericke University of Magdeburg
, Germany | A Risk Analysis Approach for Biometric Technology |
Yoon-Jung, National Security Research Institute, Korea | The Design and
Implementation for the Practical Risk Analysis Tools |
|
|
|